This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Home » IoT: A Hacker’s Wonderland in the Enterprise
Last year’s holiday season saw a large number of families giving or receiving connected devices. Apple Watches, Samsung Smart TVs, connected home devices, Internet-enabled toys like Hello! Barbie and Star Wars droids were last year’s hot gift items. Enterprises need to be prepared for the influx of devices that will be walking through the door this January. No matter what policy is in place, employees will find ways to bring devices into the workplace. Knowing the risks associated with these devices will allow companies to prepare for the potential risks.
Sensitive Data at Risk
When was the last time you read the Apple update policy agreement? Most likely not very recently, and the same goes for the large majority of employees. Consumers are largely unaware and unconcerned about the privacy policies that come with applications, products and online activity. The use of connected devices becomes a concern for enterprises when company data is being uploaded to these devices.