BETA
This is a BETA experience. You may opt-out by clicking here

More From Forbes

Edit Story

6 Ways To Protect Your Data In The Age of Wearables 1.0

This article is more than 8 years old.

This Christmas, wearable tech is projected to be hackers' next big target and there's also more data at risk. Straight from the experts themselves, here are some ways to make sure you can have the best chance at keeping your connected device from turning on you.

1. You might not want to get the first generation. “With new platforms, we don't know the vulnerabilities until some time has passed. Users can also make sure they have the most recent version for operating devices and when you get prompted for a software update, do it as soon as possible.” -- John Herrema, Good Technologies.

2. Think hard about what data can be potentially taken. "Think about the worst and assume that the data could somehow get out and then ask yourself if you can truly tolerate that or not.”

--- Scott Morrison, SVP at CA Technologies.

3. Look into the company that created that device. Each expert stated the importance of looking into a company or developer’s security history. "My advice would be to go to established manufacturers who have a track record of proving that they know how to do this. For one, Apple does a good job at keeping their devices secure.” --Orion Hindawi, Co-founder, Tanium

4. You should never rely solely on the operating system or the device. This goes back to researching the manufactures but ultimately knowing there still could be weak spots. "It's an ongoing thing and it kind of goes back to it nature of vulnerability: you don't know what you don't know.  –John Herrema, SVP of Product Management at Good Technology.

5. Beware of malicious apps. “If you’re going onto Google Play or any other application store, be aware of red flags. If you’re trying to download an application and it looks suspicious--like the developer name is misspelled or it doesn’t have a lot of downloads or starts, they can be potential hacks. A lot of infections take place in emails or suspicious links so just keep an eye out because these attacks can and will happen. With the Internet of Things, we are seeing a lot of daily activity. We see 500k attacks in minutes around the globe.”  –Derek Manky, Fortinet

6. Companies: Be proactive with security when developing. “Trying to securely code products goes a lot way because that just naturally reduces low-hanging fruit. Work with security researchers and have a fast-action plan for when you finding vulnerability. Have software updates for these devices.”  –Derek Manky, Fortinet.