sb-as logo
Story image

Unmanaged wearables pose threat to the enterprise

Unmanaged wearables are infiltrating the enterprise, and identity management for these devices should be a top priority for IT managers, according to a new Centrify RSA Survey.

Centrify, the enterprise identity and cyber threat specialist, has announced results a survey regarding the prevalence of wearables in the enterprise, and the growing concern they pose for IT security.

First and foremost, the survey found that 69% of wearable device owners forego login credentials, such as PINs, passwords, fingerprint scanners and voice recognition, to access their devices. 

On top of this, 56% of wearable owners use their devices to access business apps such as Box, Slack, Trello, Dropbox, Salesforce, Google Docs, Microsoft Office or a combination of these.

Perhaps most alarming, according to Centrify, is that despite the lack of login credentials and ready access to corporate data, 42% of wearable owners cite identity theft as their top security concern when it comes to their devices.

Lack of IT management and device control comes in second (34%) and a general increase in breaches of sensitive work data or information comes in third (22%), according to the survey.

“As wearables become more common in the enterprise, IT departments must take serious steps to protect them as carefully as they do laptops and smartphones,” says Bill Mann, Centrify chief product officer.

“Wearables are deceptively private. Owners may feel that due to their ongoing proximity to the body, they’re less likely to fall into the wrong hands. However, hackers don’t need to take physical possession of a device in order to exploit a hole in security. The best news is that solutions already exist that can easily wrap wearables into the identity management picture,” Mann says.

Story image
Microsoft: Digital transformation doesn't make SMEs immune to cyber threats
Ricky Kapur warns that despite digital transformation every business is at risk - no matter how large or small they are.More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More
Story image
Gartner reveals the top strategic tech trends for 2021
“CIOs are striving to adapt to changing conditions to compose the future business - this requires the organisational plasticity to form and reform dynamically. Gartner’s top strategic technology trends for 2021 enable that plasticity.”More
Story image
Creating private data regulations for employees
Whether employees are hired on a part-time or full-time basis, everyone must know about data privacy regulations. Everyone needs to be responsible for keeping the organisation’s data secure. More
Story image
Secureworks: Remote working exposes new security vulnerabilities
New vulnerabilities have been exposed as IT teams across the world respond to the ongoing COVID-19 pandemic.More