CES 2016: Many More Reasons for a ‘Bring Your Own Wearables’ Policy

2016_01_CES2016 has barely started, and the world’s biggest technology show has already come to an end. Last week, all people and firms involved in the digital world were watching or – if possible – attending CES (Consumer Electronics Show) 2016, the world’s largest consumer electronics trade show. As always, Las Vegas provided the backdrop as we got a tantalizing glimpse into the future. And like last year, much of the focus centered on the Internet of Things. From smart cars over Belgian drones to fridges becoming family hubs: the digital future promises to be extremely connected.

But while CES has shown us what’s coming down the road, CIOs would do well to remember that smart devices are already finding their way into the enterprise in ever greater numbers. And as they start to sync and share more data than ever before, IT leaders will need to start adapting BYOD plans accordingly.

The smart money

The Internet of Things is set to become one of the biggest things to happen in the technology world since the advent of virtualization and cloud computing. Gartner estimates the installed base of smart ‘things’ will grow to 26 billion units by 2020, while IDC is claiming that the market will be worth a staggering $1.7 trillion by that year.

That might sound like a generous prediction, but in reality the Internet of Things is already everywhere: from wearables to smart home appliances, and from connected cars to medical devices. It keeps aircraft in the sky, cars running smoothly, and even makes sure our supermarkets never run out of food.

This year the 150,000+ consumers descending on Las Vegas have witnessed what the next generation of smart things has to offer. There were flying drones, powerful new chips, designs for autonomous vehicles, and smart home gadgets all vying for our hearts, minds and wallets. And for those who like to look even further into the future – how about ‘smart foam’, designed to turn products like mattresses and seats into connected ‘things’?

Wearables was one of the first IoT sub-categories to gain real consumer traction, of course, and this interest has only grown over 2015 with the launch of Apple Watch. Now Fitbit and others are trying to wrest the momentum back with sleeker, more stylish wearable devices incorporating more functionality and back-end services to entice the consumer.

Time for BYOW

But for IT leaders, this is no time to sit back and admire the innovations in wearable tech coming down the line. Even back in March last year research we commissioned found that nearly 80% of European organizations are seeing more staff bring in wearables. That shows no signs of abating. Yet many of the big brand smart watches on the market, for example, have issues which could present security headaches to the enterprise.

Last summer, we studied Android watches from LG, Samsung, Motorola and Asus alongside the Apple Watch and Pebble. None had authentication enabled by default and the Android devices would not lock if connected by Bluetooth to a “trusted” smartphone. This means that if they were stolen together a thief would have full access to both devices. Only the Apple Watch had a timeout function and the option of wiping data after a number of failed log-ins. But it also syncs and saves far more info from the accompanying smartphone than the others – including images, contacts, calendars and Passbook data.

As the lines between corporate and personal device use blur ever further, it’s clear that security bosses need to add wearable technology to the smartphones and tablets, which they should already be covering in BYOD policies.

A few tips to consider

  • Ensure all employees are well trained in cybersecurity basics and understand the risks of wearables
  • Research market leading wearables and draw up list of allowed devices according to your risk appetite
  • Ensure they can only connect to the network if they’re up-to-date with patches, on the prescribed list and have authentication enabled
  • Smart watch apps are limited at the moment, but more are promised. Operate whitelisting or downloads only from ‘trusted’ app stores to minimise risk of infection.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.