The latest Sony SmartWatch or Samsung’s Galaxy Gear are likely to be making an appearance on many people’s Christmas lists this year. Certainly industry analysts are convinced, just one of the many firms predicting an explosion in wearables is ABI Research, whose figures predict 485 million shipments by 2018.

Wearable technology may simply seem to be fun gadgets for the tech-savvy, but they can be of real benefit in sectors where working hands free would improve processes, surgery, manufacturing and surveying are just a few examples. However, it’s their use by ordinary consumers – or rather, employees – that deserves closer attention. If wearable technology takes off at the current predicted levels, it is going to have a huge impact on the workplace and its IT infrastructure.

If you consider that most organisations have 1-3 devices logging onto their networks per employee, but that this figure is likely to rocket to 15-20 as wearable gadgets become popular, then it becomes clear that organisations have to think now and act fast to prepare.

There will be a significant increase of traffic on the network. On top of this, the flow of data through the network will become more complex. Many of these gadgets will access networks via WiFi or Bluetooth, but they will also require a connection to a laptop, desktop or a tablet in order to sync data, which could further slow down the network.

There are two main ways to ensure that a corporate network can cope with an onslaught of wearables: scale up or scale out.

Scaling out involves preparing for the influx of new devices by multiplying the number of access points and accompanying intrusion detection systems. This may be enough to avert any issues, but the organisation may outgrow the solution.

Scaling up involves upgrading the end-user’s infrastructure to better cope with the influx. This is always a more significant investment and will require alignment in terms of policy and strategy. Ongoing network vigilance is vital in keeping on top of the situation. Network monitoring will take on a more three-dimensional role to take into account what other devices or information may be connecting to each other.

Security is a crucial consideration. Although it sounds like the stuff of a spy thriller, Google Glass and other gadgets will enable the users to record everything they see, including sensitive and classified data, which could then be inconspicuously transferred outside of the company. Companies need to ensure that their application firewalls are up to the task of stopping unauthorised access and allowing authorised transactions.

It is important to remember that many different devices entering and leaving the network may leave the network vulnerable to malicious attacks, such as viruses and other cyber threats.

Needless to say, technology solutions alone will not mitigate the security threat of wearable technology. As well as ensuring these precautions are put in place, businesses need a robust BYOD policy as the backbone of their security. Deciding what technologies and behaviours to allow or block will not be easy. The watchwords here will be continued vigilance, that is to say, ensuring the policy remain response rather than set in stone, and clear communication with employees so everyone knows exactly what is ok and what’s not.

 

By Stephen Demianyk, Channel Manager at Ipswitch UK.


PrivSec Conferences will bring together leading speakers and experts from privacy and security to deliver compelling content via solo presentations, panel discussions, debates, roundtables and workshops.
For more information on upcoming events, visit the website.


comments powered by Disqus