HP has found that smartwatches with network and communication functionality are an open frontier for cyber attacks and easy to hack.
Following this report, CBR spoke to five tech security experts to understand what the wearables industry needs to focus on.
1. Symantec
Sian John, Chief Security Strategist EMEA
"There are a few basic security precautions to help guard against the risk of exposing personal and self-tracking information when using these devices including the use of stronger passwords, not reusing the same user name and password between different sites and by using a device-based security solution on your mobile device if available."
2. Bitdefender
Alexandru Catalin Cosoi, Chief Security Strategist
"All smartwatches, regardless of their brand, are exposed to security vulnerabilities. To enhance security, manufacturers need to consider encrypting communications in transit, securing mobile interfaces from account enumeration and providing regular firmware updates.
"Users should do their part by enabling two-factor authentication and locking their smart devices with complex passcodes to prevent unauthorised access."
3. Good Technology
Phil Barnett, GM of EMEA
"Many users will be blindly adding their new watches to mobile devices that hold a wealth of corporate information, creating a potential security vulnerability for their employers. With native Mail and Calendar applications sending alerts and notifications to the watch by default, even more devices will have access to corporate information, potentially putting more important data at risk.
"One way to ensure enterprise data is secure on smartphones, tables and wearable devices is keeping it in separate, encrypted containers."
4. KPMG
Matt White, SM for cyber security
"Many of the watches (and other wearable technologies) use ‘device pairing’ along with pin/password to provide authentication, but this alone provides limited protection form a serious assailant. As with many security conversations, the level of security is a recipe of convenience, user experience and security."
5. Accellion
Paula Skokowski, CMO
"From a technical perspective, IT and security teams need to ensure that employees have approved apps for securely accessing and sharing content on all the types of devices they use to do their work including laptops, smartphones, tablets, desktops and wearables.
"Access to enterprise content should only be allowed via approved apps that include the following security features."