Indian CIOs speak about how to effectively handle wearable devices and the potential security risks attached to it. The Internet of things is everywhere. Smart glasses, smart watches, fitness trackers—everything redefines the wearable era we live in.Although speculations around IoT and security are doing their rounds, Indian CIOs feel that by applying appropriate measures, these tethered devices which can connect and communicate with the analog world around them, can actually protect valuable assets and information. Rajesh Saboo, vice president-IT Services, Future Group, says that it is all about adaptability and acceptance of wearables in his enterprise. “With proper communication and awareness all security threats can be controlled. Employees should be informed about their activities being under surveillance. This will result in working in a controlled environment,” he adds.“Educating employees about wearable devices and the guidelines to be followed is important,” agrees Monika Phartyal, ISIT head, Renault India. In today’s world of multiple security breaches, companies should take extra care to ensure their intelligent property is protected. The lack of encryption makes these seemingly harmless gadgets attractive to cyber criminals. Recording inappropriate audio and capturing sensitive images can also cause heartburn to many CIOs. A rigid IT policy is needed ensure everything is secure. “Security becomes a huge concern for us because the nature of the business data is critical. We will have to work on processes, policies, and mechanism to secure data,” says Monika. “There can hardly be any security threat in terms of data being leaked out, and in case it is being breached, there are tools to monitor that as well,” says Saboo.In order to prepare for the incorporation of wearable technology in workplaces, enterprises should take several steps.Rina Sriwastwa, head of IT, Bharat Aluminium, says, “With proper reporting, monitoring, and security policies, we can deal with the influx of the wearable technology.”“Using MAC (media access control) addresses, IT can figure out and track when a new device connects to their network. It should consider creating a second network for foreign devices such as wearables, because one does not know how many people are going to use it,” says Phartyal. Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe