Story image

Unmanaged wearables pose threat to the enterprise

08 Mar 2016

Unmanaged wearables are infiltrating the enterprise, and identity management for these devices should be a top priority for IT managers, according to a new Centrify RSA Survey.

Centrify, the enterprise identity and cyber threat specialist, has announced results a survey regarding the prevalence of wearables in the enterprise, and the growing concern they pose for IT security.

First and foremost, the survey found that 69% of wearable device owners forego login credentials, such as PINs, passwords, fingerprint scanners and voice recognition, to access their devices. 

On top of this, 56% of wearable owners use their devices to access business apps such as Box, Slack, Trello, Dropbox, Salesforce, Google Docs, Microsoft Office or a combination of these.

Perhaps most alarming, according to Centrify, is that despite the lack of login credentials and ready access to corporate data, 42% of wearable owners cite identity theft as their top security concern when it comes to their devices.

Lack of IT management and device control comes in second (34%) and a general increase in breaches of sensitive work data or information comes in third (22%), according to the survey.

“As wearables become more common in the enterprise, IT departments must take serious steps to protect them as carefully as they do laptops and smartphones,” says Bill Mann, Centrify chief product officer.

“Wearables are deceptively private. Owners may feel that due to their ongoing proximity to the body, they’re less likely to fall into the wrong hands. However, hackers don’t need to take physical possession of a device in order to exploit a hole in security. The best news is that solutions already exist that can easily wrap wearables into the identity management picture,” Mann says.

Download image
Whitepaper: Five stages of vulnerability assessment strategies
Tenable’s Cyber Defender Strategies Report specifically focuses on key performance indicators (KPIs) associated with the Discover and Assess stages of the five-phase Cyber Exposure Lifecycle.More
Story image
11 Jun
How Intel aims to make enterprise collaboration accessible for all organisations
As companies of all sizes turn to cloud computing for its flexibility, efficiency and overall cost-effectiveness, they are also looking for ways to make meetings more productive.More
Download image
CASE STUDY: Prototyping key to success when challenging design assumptions
Central Innovation helped Nura leverage CAD software SOLIDWORKS to refine and prototype the Nuraphone, culminating in a product that won the Best Innovation in Headphones category at consumer goods conference CES this year.More
Link image
Cybersecurity 101: How to start protecting your organisation
Commercial losses, a damaged reputation or disruption to operations are all possible when your business is the victim of a cyber-attack.More
Story image
14 Jun
Dropbox fuels collaborative workspaces with latest updates
Dropbox is introducing what it calls the ‘biggest user-facing change in the company’s history’, as it moves to become a central collaboration platform for teams, tools, and content.More
Story image
10 Jun
Infosys collaborates with Microsoft to accelerate digital transformation
Leveraging the latest digital technologies, the solutions aim to improve the entire lifecycle of building construction and operations.More