The risks of wearable tech in the enterprise

Unfortunately, BYOD or Bring Your Own Device, is still being debated in some organisations that are coming to grips with the shifting enterprise IT landscape and their own cost, risk and compliance environments.

Problem is that the enterprise BYOD horse has already bolted, so to speak. The fact that the usage of mobile devices is outstripping laptops and PCs is nothing new, and this trend is likely to accelerate.

The real challenge for organisations concerned about protecting their intellectual property is in recognising that information security risks are not necessarily reduced with the arrival of new, innovative and intuitive technologies. That intuitive, readily accessible cloud based file storage solution may have it’s place, however the risks from accidental or deliberate security breaches are very real.

For organisations that retain competitive advantage through protecting intellectual property in one form or another should be proactively shaping their information security policies and processes to meet the challenge before it arrives.

• The gradual demise of the once giant Nortel through the persistent siphoning off of intellectual property by alleged Chinese hackers over a 10 year period should be a salutary reminder that nothing should be taken for granted in the realm of information security.

For the public sector, the term ‘intellectual property’  generally has its equivalent in privacy, security and other confidentiality mandates.

Wearable Technologies – the new enterprise IT disruptor?

Wearable technologies are nothing new.  The humble wristwatch could be described as the first and probably most widely used item of wearable technology.  It blends utility with style, and plays a part in saying something about who you are (or want to be) whether you are wearing a $10 digital throw-away watch or a $6,000 Rolex.  Fashion accessories that integrate internet connectivity, miniaturized technologies, software and relevant information are already seeing the emergence of products such as Google Glass and the Smartwatch.

The use of these consumer-led technologies in organisations concerned about confidentiality, privacy and intellectual property protection should be considered carefully.

Banning the use of new and emerging technologies is not likely to be effective, however the evolution of your enterprise information security policies, together with the appropriate eduction of  all working within the organisation, whether employee, contractor, outsource provider, or any other party for that matter should be the starting point.

When it comes to proactively managing wearable technologies in the enterprise, here are few pointers for you to consider


1. This is NOT an IT issue to be solved solely by your IT department

The IT department has little to no real control over who brings what consumer technologies to the workplace, whether in their carry-case, wrist or pocket. This is an organisational issue requiring an organisational response. Executive accountability need to be assigned, and not just to the CIO or IT Manager.

2. Chasing the dragon

The demand for useful, innovative, consumer technologies is never ending. Those that are hooked on the latest ‘big thing’ in the IT world can bring their influence to bear on others within the organisation, leading to shadow IT.  It’s inevitable


3. Shift the focus from technical risk to Systemic risks

Technical Risk: “All systems are running perfectly, Captain!”
Systemic Risk:  “What iceberg Captain?”

It probably is a good idea to make sure that your Executives and managers across the organisation understand the key difference between systemic and technical risks.
The blurring of the lines between consumer based technologies and, so called enterprise technologies is only beginning, and organisations that understand the trend, what to do about it, and not just rely on (or blame) enterprise IT for delivering results ‘because it’s using the internet or technology’ may be a self limiting approach in the medium term.

BIO:  Rob Livingstone, a former CIO is the owner and principal of Rob Livingstone Advisory, an independent Sydney based IT advisory practice, and a Fellow of the Faculty of Engineering and Information Technology at UTS. Subscribe to Rob’s monthly newsletter at www.rob-livingstone.com
.

 

Join the CSO newsletter!

Error: Please check your email address.

Tags hackersRob LivingstoneGoogle GlassBYOD securitysmartwatchBring Your Own Devices [BYOD]

More about GoogleNortelRob LivingstoneTechnologyUTS

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Rob Livingstone

Latest Videos

More videos

Blog Posts