Security and Privacy for Wearables Not So Good

Security and Privacy for Wearables Not So Good

Cisco predicted that by 2019 more than half a billion wearable devices will be in use every single day, and I’m not just talking about smartwatches. Look for fitness trackers, cameras, Bluetooth-enabled jewelry, hotel key bands, connected hearing aids, etc. to be added to the list of technology strapped to bodies. With all this data flying around, where does security and privacy come into play with wearables? Mostly, it doesn’t.

You might be surprised to know that users of wearables grant permission without realizing exactly what information they are agreeing to give up.

“Especially with fitness devices, if you read the license agreements, if people realized what they are signing up for, they might be horrified at what they’re allowing the companies to do with the data,” explained Damien Mehers, wearables developer who built the Evernote app for Pebble and Samsung Galaxy Gear. “I think there needs to be more clarity and perspective from the user.”

The majority of wearable manufacturers acknowledge security concerns and risks, but believe that giving up a bit of privacy is the price for using a wearable device, especially when most security and privacy details are explained in the license agreement. But, honestly, who really takes time to read it? Most people scroll to the bottom, tick the box and move on.

To address concerns about privacy and security of wearables, some people have resorted to simply not using wearable technology at all while others rely on companies to build their wearable apps on software platforms that have enterprise-grade security already built in.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West
  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West
  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West
  • SIA Releases New Report on Operational Security Technology

    The Security Industry Association (SIA) has released an impactful new resource – Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.