The security worries behind the wearable tech boom

Manfred Kube, head of M2M Segment & Offer Marketing,
Gemalto

There are few areas of technology, if any at all, that are growing faster than wearables. Countless enterprises and organisations across a diverse array of industries are taking advantage of these new types of technologies, exploiting the potential of 24/7 connectivity. But the wearable boom also brings with it a new set of security worries the industry needs to address.

As wearables grow in popularity, and the IoT becoming increasingly important in the wearables landscape, security concerns are at an all-time high. Recent Telecoms.com Intelligence research has shown that 42% believe that security challenges represent the biggest inhibitor to IoT, says Manfred Kube, head of M2M Segment & Offer Marketing, Gemalto.

The recent TalkTalk hacks are a prime example of how vulnerable your data can be – and wearables multiply this risk. It is not just these big corporations who are at risk of having their data stolen – it can happen to anyone, anywhere, at any time. As more wearable technology is available to consumers, such as the Apple watch and FitBit, the vulnerabilities and security risks within IoT devices only become more prevalent.

This same Telecoms.com Intelligence research suggests that 45% of people believe that between 10-40% of IoT data is considered ‘sensitive’, so it is of the utmost importance to ensure the data within wearables is secure. When you think about the vast reach that wearable technology can and will have, the possibilities are sobering. A malicious attack could in theory reveal not just where you are, but your regular daily movements, how you feel, and even how and when to get into your house.

The nature of IoT devices being globally connected is what makes them so exposed to cyber-attacks. It is of central importance that manufacturers and developers don’t only consider security as an afterthought.

These devices and services need to be secure by design. In addition to the devices themselves, the cloud infrastructure that devices interact with and which stores all the data must also be tightly secured – including authentication/identification, confidentiality, and non-repudiation elements interconnected within the device and the network.

Of course, not everything needs securing to the maximum degree, but the first step must be to do a risk evaluation, working out ways in which people could exploit a product or service; and malicious users and hackers can be extremely creative to this end. Being aware of what could potentially be at risk is vital.

The benefits of wearables are obvious to all – ease of use, and having connectivity across all your devices transforms the ordinary day to the extraordinary. Existing web services like online banking have thrived because people know the lengths to which their banks will go to keep their identities secure in an environment where hacks and cyber exploits are reported daily. Security holes in the wearable market could, if exploited at scale, undermine the industry and diminish its growth.

It’s something that’s been on the Gemalto agenda for some time, however we are still in the early days of the wearable era and there’s a still lot to do. The industry needs to collaborate and co-operate on this so we can reap the benefits, but not expose ourselves to data theft or other malicious attacks, such as the device itself being taken over or used for surveillance.

Educating customers about the potential risks is key. Once you explain the benefits of IoT and what’s being done to ensure security is a number one priority, customers will soon begin to trust in the IoT. After that, the future of wearables will look very bright.

The author of this blog is Manfred Kube, head of M2M Segment & Offer Marketing, Gemalto

Comment on this article below or via Twitter: @IoTNow_ OR @jcIoTnow

RECENT ARTICLES

SandboxAQ’s AQtive Guard deployed by SoftBank for cryptographic security

Posted on: April 16, 2024

SandboxAQ have announced the deployment of its AQtive Guard cryptography management platform by the Advanced Research Group of SoftBank. This followed testing of AQtive Guard’s abilities to discover cryptographic and certificate-based vulnerabilities to AI-based and quantum computer-based cyber attacks against IT systems, including networks, end-points and applications.

Read more

VOZIQ AI sets AI retention strategy for Hawx

Posted on: April 15, 2024

VOZIQ AI recently concluded the executive review meeting with Hawx’s leadership team, where VOZIQ AI’s chief data scientist, Vasudeva Akula, rolled out a 365-day roadmap for proactive customer experience management, proactive renewals and loyalty management, using AI driven insights for each customer.

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more