croom new

Eclipse Integrated Systems Blog

Smartwatches Haven’t Become Much Smarter

Smartwatches Haven’t Become Much Smarter

The smartwatch has quite a few benefits, but anything that one might bring to the table is offset drastically by its position as a threat magnet. Vulnerabilities in smart watches and other wearable technology makes using these devices somewhat risky behavior. Today, we will look at some of the features of the modern smartwatch, how hackers are utilizing them to be disruptive, and what you need to do to protect yourself from the risk posed by hackers.

The Smartwatch
There has been an actual smartwatch market now for almost a decade, but the first smartwatch was actually developed in the late ‘90s. Today, the smartwatch is most frequently used as a peripheral to the smartphone. They come in all shapes and sizes, and for the most part, they tend to have some utility to the user. Some of the main benefits to using a smartwatch include:

  • Convenience - It is extraordinarily convenient to check your watch and get all the information that you need to get, like notifications, calendar events, and more. Today’s smartwatches even give you the ability to seek out information. Using a strong integration and its own processing power, today’s smartwatches do many of the things that the smartphone can do, from a screen the size of a watch face.
  • Functionality - Speaking of that functionality, the newest smartwatches have all types of features. From being able to integrate with some of your favorite apps, to practical functions that make them so useful, smartwatch manufacturers continue to push the envelope to what is possible for wearable technology.
  • Discretion - What is probably the most advantageous variable of the smartwatch, it provides the user the ability to be discreet about mobile interaction. Where most people will have their phone in their face a lot of the time, the ability for users to push notifications to their wearable, provides constant access to social networks, messaging, and practical information such as weather; and, since they are designed as a timepiece, it provides that function as well.

Security Concerns
The major drawback of wearable technology is how it connects with a user’s mobile device. Typically, the wearable connects via Bluetooth, it is just an extension of that devices functionality. One problem is that these devices also can connect to Wi-Fi networks. For businesses that want to run a tight ship, wearables present a strain on their BYOD policy. Since many of these devices don’t come with onboard security, they are immediately viewed as a vulnerability.

For the modern hacker, who looks for any vulnerability they can attack, wearables present an opportunity. Since network security best practices suggest that limiting access points is a great way to attempt to eliminate vulnerabilities, wearables are a problem. If a hacker gained access through an application at the wearable level, it could conceivably compromise the connected device and any network that device is connected to.

While industry experts agree that while a lack of wearable security isn’t a huge concern overall, it is something that should be addressed when rolling out an organization’s BYOD policy. There are some other concerns that include:

  • The unwitting collection of any electronic Protected Health Information (ePHI) could put an organization in the crosshairs of healthcare mandates such as HIPAA. You’ll want to limit access to employee fitness and wellness data if wearables are a concern for your organization.
  • A lack of education about the potential vulnerabilities' wearables present for not only a business’ data, but the user’s data. If you are going to allow wearables to access your networks, it’s important to educate your staff on the type of data their wearable devices collect, what it is used for, and where it ends up when it’s collected.
  • Since there are no real anti-malware solutions for IoT devices, the management of these devices need to be approached with care.

Wearables are useful devices that do have a future, but it is important to come up with a policy that protects the data your organization has on its network from potential threats. To learn more about how to roll out a comprehensive Bring Your Own Device policy, and protect your network against threats of all types, call Eclipse Integrated Systems’s IT professionals today at 800-340-0505.

Breaking Down Collaboration’s Levels
Tip of the Week: Protect Your Word Document with a...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 23 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Network Security Internet Google Hackers User Tips Malware Productivity Software Business Management Microsoft Tech Term Efficiency Innovation Hosted Solutions Backup Computer Windows 10 Browser Business Apps Email Cybersecurity Mobile Devices Managed IT Services Smartphones Productivity Saving Money Hardware Communication Smartphone Internet of Things Data Backup Windows Small Business Data Recovery VoIP Android Virtualization Cybercrime Collaboration Holiday Network communications Mobility Business Continuity Mobile Device IT Support Microsoft Office Law Enforcement Operating System Data Security Passwords Wireless Ransomware Disaster Recovery Workplace Tips Users IT Support Data Miscellaneous Cloud Computing IT Services Social Media Outsourced IT Wi-Fi Mobile Device Management Telephone Systems Chrome Phishing Office 365 Server BDR Quick Tips Update Windows 10 Money Password Gadgets Best Practice Unsupported Software Vulnerability Cost Management Google Drive Employer-Employee Relationship Facebook Social Government Health Application Information Technology App Risk Management Upgrade Information Shortcut Data Management Two-factor Authentication Networking Work/Life Balance Save Money Managed IT Services Sports Current Events Managed IT Office tips Proactive IT Automation USB Artificial Intelligence Antivirus Blockchain Streaming Media Spam Alert Bandwidth Patch Management Computers Managed Service Provider Identity Theft User Error Marketing Hacking Politics History Outlook VPN Samsung OneNote End of Support Battery Cleaning Managed Service Social Engineering Business Intelligence Telephony Humor Private Cloud Excel Connectivity Storage Meetings Remote Computing Training Going Green Compliance iPhone Managing Stress Devices Touchscreen BYOD HaaS Audit Apple Recovery Cortana Company Culture Automobile Save Time eWaste Personal Information WiFi Tech Support SaaS Commerce Mobile Computing DDoS Gmail Legal Wireless Charging Computer Care Google Docs Transportation Search Fraud Analytics Internet Exlporer Data Storage Remote Monitoring and Management Flexibility Access Control The Internet of Things Wireless Technology Television Medical IT Hosted Solution Word Data Protection Office Applications Encryption Maintenance Router Mobile Security Scalability Evernote PowerPoint Authentication Data storage PDF File Sharing Worker Commute Language Proactive Trending Teamwork Google Assistant GDPR Lithium-ion battery Windows Ink Ciminal Bring Your Own Device IT solutions IT Management Books Administrator Scam Nanotechnology Licensing Instant Messaging Device Security Wireless Internet Consultant Cast Sales Experience Identity How To Authorization Healthcare Text Messaging Websites Amazon Hiring/Firing iOS Value Dark Web Google Maps Point of Sale Project Management Wearable Technology Hybrid Cloud Windows 10s IT Solutions FAQ Data Privacy Access Employer Employee Relationship Root Cause Analysis Travel Unified Communications Help Desk Uninterrupted Power Supply Operating Sysytem Retail Phone System Sync Workers Downloads Data Theft Virtual Assistant Budget Benefits Video Games Charger Error Settings Advertising Data Loss IT budget Managed IT Service Solid State Drive Hard Drive Computer Accessories Augmented Reality Tablets Spyware RAM Certification Avoiding Downtime Electronic Medical Records Conferencing Music Smart Technology Computer Fan Reputation Updates Trends Troubleshooting Legislation Computing Plug-In Chromecast WIndows Server 2008 Internet Explorer Microsoft Office 365 Running Cable Cables Files Hacker Hard Disk Drive SharePoint Chromebook Reporting NFL Virtual Reality Microsoft Teams Security Cameras Safety Emails HBO Gifts WannaCry Adobe Black Market Microsoft Word A.I. Profitability Laptop Unified Threat Management Comparison Entertainment Bluetooth Distributed Denial of Service App store Data Breach Threat Microsoft Excel Identities Virus Voice over Internet Protocol Keyboard Printing Robot Vendor Management Education Edge G Suite Wearables Webinar Credit Cards Big Data Movies Eliminating Downtime Touchpad Upgrades Screen Mirroring Specifications Fax Server Analysis Relocation Worker Printers Twitter Regulation Cache Remote Monitoring CrashOverride Disaster Emergency Monitors

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login