The Internet of things is everywhere. Smart glasses, smart watches, fitness trackers\u2014everything redefines the wearable era we live in.Although speculations around IoT\u00a0and security are doing their rounds, Indian CIOs feel that by applying appropriate measures, these tethered devices which can connect and communicate with the\u00a0analog\u00a0world around them, can actually protect valuable assets and information. \u00a0Rajesh\u00a0Saboo, vice president-IT Services, Future Group, says that it is all about adaptability and acceptance of\u00a0wearables\u00a0in his enterprise.\u00a0\u201cWith proper communication and awareness all security threats can be controlled. Employees should be informed about their activities being under surveillance. This will result in working in a controlled environment,\u201d he adds.\u201cEducating employees about wearable devices and the guidelines to be followed is important,\u201d agrees Monika\u00a0Phartyal,\u00a0ISIT head, Renault India.In today\u2019s world of multiple security breaches, companies should take extra care to ensure their intelligent property is protected. The lack of encryption makes these seemingly harmless gadgets attractive to cyber criminals. Recording inappropriate audio and capturing sensitive images can also cause heartburn to many CIOs. A rigid IT policy is needed ensure everything is secure.\u00a0\u201cSecurity becomes a huge concern for us because the nature of the business data is critical. We will have to work on processes, policies, and mechanism to secure data,\u201d says Monika.\u201cThere can hardly be any security threat in terms of data being leaked out, and in case it is being breached, there are tools to monitor that as well,\u201d says Saboo.In order to prepare for the incorporation of wearable technology in workplaces, enterprises should take several steps.Rina\u00a0Sriwastwa, head of IT, Bharat Aluminium, says, \u201cWith proper\u00a0reporting, monitoring,\u00a0and security policies, we can deal with the influx of the wearable technology.\u201d\u201cUsing\u00a0MAC (media access control) addresses, IT can figure out and track when a new device connects to their network. It should\u00a0consider creating a second network for foreign devices such as wearables, because one does not know how many people are going to use it,\u201d says\u00a0Phartyal.