Technology | 4 MIN | 20/04/2016

Security in the use of wearables

Compartir en Facebook Compartir en Twitter Compartir en Pinterest

Security in the use of wearables

Security | Access | Technology

The IoT is already present in our daily lives and is here to stay. The use of wearables has grown exponentially in recent years. These devices help us and make our lives easier, but do you know how to use them safely? Here are some tips to help you avoid any risk and keep your privacy safe.

IoT: Internet of Things
IoT: Internet of Things

The IoT (Internet of Things) is getting its place in our daily lives. The use of wearables and connected devices is growing at an unstoppable pace. During 2015 greater than 600% growth figures were achieved, which makes us think that wearables are here to stay.

Smart bracelets smartwatches, heart monitors, glasses, headphones and even smart clothes, make our daily work easier. They track, record information and provide us with a multitude of tasks. It is already possible to know how many steps you have walked, plan a running route, the quality of our sleep, what our heart rate is and even how many calories you have consumed during the day. We can have all the information we need at our fingertips, find maps, watch videos, answer e-mails and even scan foods... The use of these devices is absolutely personal, they are carried close to the body and create a feeling of total privacy. However, is it so? Do we have the assurance that our data are completely safe?

What are the risks you must keep in mind when using your wearable?

Knowing what time you jog, what route you follow, your habits, diseases, your location, etc. is information that can be useful for someone who wants to make fraudulent use of the same or commit some sort of criminal act.

Similarly, and in other areas, not to mention harassment or hacking, the information collected is beginning to be used by third parties such as insurance companies to make recommendations for healthy habits to their customers, and even as valid evidence in trials.

What are the risks you must keep in mind when using your wearable?

One of the main risks in some wearables devices is that they use a wireless Bluetooth connection to connect to your smartphone, and this is where your device becomes vulnerable, as it enables hackers to gain access to it and all the data it contains. They don't need to physically have your device, but they take advantage of that security hole to get all the information that interests them.

In others cases, the problem is the vulnerability of storage systems related to passwords. It seems that in some devices unencrypted information is transmitted, and user management is poor, so if someone gets the password can access all our private information.

What to do to protect your wearables from possible hacks and ensure confidentiality?

An added risk is the lack of privacy (or complicated accessibility to them) to explain clearly and simply what they do with user data, why they collect them, and if they are transferred to third parties.

Finally, we cannot forget that the data we provide to companies is stored on servers, which can also be attacked by hackers, as has happened in some cases very popular we all remember.

But, what to do to protect your wearables from possible hacks and ensure confidentiality? Very simple

When purchasing a new wearable, learn about the technology used, security measures offered, which data it collects and how it manages them. It is a fundamental first step to avoid unnecessary risks.

Use a PIN. Although it is not a foolproof mechanism, it serves as a deterrent to hackers or thieves.

It limits the information you share. Wearables don't need to access to all the information about you. It is possible that in some cases they don't need to know your location, access your photos, or your agenda. Establish the privacy settings appropriately depending on the type of device and the use you will make of it.

Use if necessary, complete security systems which also protect your computer, to prevent that when making a backup of the phone, a possible new route by which access to your information opens.

SOURCES (Spanish):
https://eventosti.net/blog/2015/04/29/la-seguridad-en-wearables-todo-lo-que-necesitas-saber/
https://buguroo.com/es/los-riesgos-de-seguridad-de-los-wearables
https://www.osi.es/es/actualidad/blog/2015/12/18/la-privacidad-en-wearables-en-que-punto-se-encuentra.html

In By we believe in technology and innovation to help development and improve the lives of people.

Do you want to learn more about us?

[enlace pagina="Empresa" ancla="#empresa-formulario"]Contact us at info@by.com.es or call us at +34 91 870 71 93 or at +34 91 872 95 76.[/enlace]

Discover NÜO solutions

Request our Free DEMO and find the Access Control System you need.

Request DEMO
img-mandos

Escrito por:   NÜO Planet

Categorías:   Technology