fbpx

Are Your Employees’ Smartwatches Security Risks?

by | Jan 4, 2021 | MyTek Blog, Security

Q

Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

Are Your Employees’ Smartwatches Security Risks?Are Your Employees’ Smartwatches Security Risks? The smartwatch is one of the most popular gifts given to technology lovers; and, they have quite a bit of utility. They can help improve communication, health, and of course give them a sleek accessory. One problem that people don’t often consider is how their employer has to handle the influx of smartwatches and other IoT devices that are brought to work after the holidays. Today, we’ll briefly discuss how Internet of Things devices could be security risks and what a business should do about it. 

Personal Data Needs to Be Protected

Are Your Employees’ Smartwatches Security Risks? The first thing we are going to touch on really doesn’t have to do with businesses, it has to do with smartwatch users. The smartwatch is a cool gadget and can do a lot of really neat things as long as you remember to charge it. Unfortunately, there is some risk involved in allowing these devices access to your business’ network. Some models don’t have completely fleshed out operating systems and could provide hackers an avenue of access to the rest of your business’ computing infrastructure if they aren’t kept updated. 

Many of the noted security shortcoming of these devices may not mean anything for your business, but should be a consideration. It’s a best practice to create, implement, and enforce a BYOD policy that extends to smartwatches and other wearable technology and IoT devices.  Here are a few tips that you can pass onto your employees to avoid problems with vulnerabilities brought onto your network through wearable technology: 

  • Users shouldn’t use unofficial apps – Users need to avoid “jailbreaking” a device to give them access to applications that they wouldn’t typically have. Jailbreaking is essentially installing a non-authorized version of an application or operating system on a device. It voids the warranty and can exacerbate the questionable security surrounding smart devices. If the Google Play Store and the Apple App Store can’t always catch malicious apps, importing apps from an unsupported platform is a risky proposition.
  • Don’t jailbreak your phone – This should be common knowledge, but you really shouldn’t jailbreak your phone either, but especially don’t use a smartwatch with a jailbroken phone. 
  • Don’t connect devices directly to your watch – Avoid hooking up things directly to the watch. If your plan was to use your watch as a cool controller for all of your smart devices, you should immediately reconsider. Since there are built-in vulnerabilities for many watches, it’s important to choose options that prioritize security. 
  • Keep your smartwatch OS and other apps updated – Software vulnerabilities can cause major problems regardless of what platform they come on. Smart devices like smartwatches are no different. Keep their OS up to date for the best security. 

Build an IoT Security Strategy

With the popularity of smart devices, there is probably a pretty good chance that you have plenty of them already at your place of business. In order to get the control you need, you will likely need a BYOD (Bring Your Own Device) strategy that also considers the IoT endpoints that are brought in. This is called a Bring Your Own Internet of Things (BYOIoT) Strategy. 

By extending your BYOD strategy to a BYOIoT strategy, you not only have the coverage you need to keep threats off of your organization’s network, but you also have the solutions in place to scale that platform as your employees plan on bringing in additional smart devices. Securing endpoints and monitoring data flow will be important strategies to consider in the days and years ahead. 

Securing the endpoints on your network is extremely important. For more information about what COMPANYNAME technicians can do for you, give us a call today at PHONENUMBER.

ABOUT THE AUTHOR

Tim - Team

Tim Tiller, LMSW

 
Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.

Q

Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.

AUTHOR’S RECENT POSTS

How to Use Google Drive to the Fullest Today

How to Use Google Drive to the Fullest Today: For the business seeking out a comprehensive cloud-based content management and collaboration solution, Google Drive is an option that warrants serious consideration. While we don’t want to recommend it over another one of...

Are You Worried About Losing Your Technology?

Are You Worried About Losing Your Technology? Remote work has been on the rise for some time, even before the COVID-19 pandemic made it the safest way for a business to operate. Naturally, this makes organization a particularly crucial thing to consider, especially as...

Can You Save Money from Going Paperless?

Can You Save Money from Going Paperless? Everyone knows that printing is costly. They come from nearly every direction: paper, ink, machines that seemingly always need some type of maintenance, the list of costs goes on and on. Some businesses, looking to get away...

Mobile? Grab this Article!

QR Code

Blog Archive

Share This