• Skip to primary navigation
  • Skip to main content
S2 Grupo

Spanish Company Specialized in Cybersecurity

  • Company
    • About Us
    • Governing Bodies
    • CSR
    • Awards and Acknowledgments
  • Specialization
    • OT Industry
    • IT
    • OT Health
  • Solutions
  • R&D+I
  • Talent
  • News & Publications
  • Contact
  • facebook
  • twitter
  • instagram
  • linkedin
|
en arrow down
  • es
© 2022 S2 Grupo
Corporate

Eight cyber risks associated with the use of wearables

14 Jul 2017
  • The S2 Grupo team has warned that the use of this technology could expose users’ sensitive information on the Internet, that it is essential to protect to avoid being victims of cyberattacks.
  • Failure to establish proper privacy of the application associated with the device, leave Bluetooth connected or accept unnecessary permissions for its operation, could jeopardize the privacy of its owners.

Valencia, July 12, 2017.- Wearable technology is currently one of the most used and it is expected that its trend will continue to rise in the coming years. It includes devices of all kinds that people carry with them to interact in some way (for health, entertainment, sport, etc.). Its usefulness is very attractive to users since they can allow from knowing the exact location of your child to registering the exact route they do when they go running, among many other options. Therefore, S2 Grupo has warned that this exposure in the Internet of people who use the apps connected to these wearables may entail some cyber risks that it is imperative to take into account before activating them. "Just as a device of this type allows us to know where our child is, it can also serve to make this information known to a cybercriminal. In the same way, we can be at risk of others knowing the exact route we do when we run or we could be a victim of extortion if they access private talks or our gallery of images", said José Rosell, associate-director of S2 Grupo. Eight cyber risks of wearables and how to improve our cybersecurity:

  1. The security of the servers where data is stored.- Although this does not depend on the user, if the company creator of the device does not have secure servers, we run the risk of our information being accessible to possible cyberattacks.
  2. Unsafe privacy policies.- The first step in starting to use a wearable is to download the application that allows you to update and record all the information. Here it is essential to verify that it is a privacy policy in conditions that guarantee the protection of user data. We need to know what data they will store, why and how they will be processed to ensure that they are not transferred to third parties for their benefit.
  3. Unsafe configuration of the profiles.- In this type of applications the main risk is not so much the interactivity that their users have, but because they usually configure their profiles with an insecure privacy. It is important to review this to protect our information to the maximum extent possible.
  4. The information is usually public by default.- Especially in the applications of these devices related to sport, you can access by default to any other member and know their activity. In this way, the information of a user is exposed to anyone who uses the same application and a cybercriminal could prepare a targeted attack with information that, without much effort, he could find. The best thing to do is to make an appropriate privacy configuration of the profile, avoiding sharing all the information in a public way.
  5. Beware of requested permissions.- It is essential to verify that the permissions requested by the app are those strictly necessary for its operation.
  6. Be careful of passwords.- It is essential to use strong passwords to access the application if we want to prevent potential digital offenders from accessing our data.
  7. They usually need the bluetooth connection. - Once the wearable is used, many times it is necessary to connect the bluetooth to dump the data in the app and to see the progress that is made or any other information that it provides. This action really leaves the user exposed and could open a door easily accessible to the device. Once done, it is important to disconnect again to prevent it from being accessible to any digital attacker.
  8. Always be aware of the updates of the application.- As new versions appear have to be installed because they usually incorporate measures to prevent security vulnerabilities.

More information: prensa@s2grupo.es

  • fb
  • tw
  • in
Related Articles
Show all →
Corporate
Trickbot, the main cybersecurity threat for the banking sector
Leer más →
Corporate
GLOBAL OMNIUM INAUGURATES THE FIRST CYBERSOC OF THE WATER SECTOR IN SPAIN
Leer más →
Corporate
Decalogue for cybersecure Christmas shopping
Leer más →

Follow us in our newsletter

Subscribe through your email to stay up to date

S2 Grupo
© 2022 S2 Grupo
  • Press Center
  • Legal Disclaimer
  • Privacy Policy
  • Cookie policy
S2 Grupo utiliza cookies propias y de terceros para permitir tu navegación, fines analíticos y para mostrarte publicidad personalizada en base a un perfil elaborado a partir de tus hábitos de navegación (por ejemplo, páginas visitadas). Clica aquí para acceder a nuestra Política de Cookies. Puedes aceptar todas las cookies pulsando el botón “ACEPTAR” o configurar o rechazar su uso pulsando el Botón “CONFIGURAR”
ConfigurarAceptar cookies
Manage consent

Resumen de Privacidad

Este sitio web utiliza cookies para mejorar su experiencia mientras navega por el sitio web. De estas, las cookies que se clasifican como necesarias se almacenan en su navegador, ya que son esenciales para el funcionamiento de las funcionalidades básicas del sitio web. También utilizamos cookies de terceros que nos ayudan a analizar y comprender cómo utiliza este sitio web. Estas cookies se almacenarán en su navegador solo con su consentimiento. También tiene la opción de optar por no recibir estas cookies. Pero la exclusión voluntaria de algunas de estas cookies puede afectar su experiencia de navegación.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
CookieDurationDescription
pll_language1 yearThe pll _language cookie is used by Polylang to remember the language selected by the user when returning to the website, and also to get the language information when not available in another way.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Necessary
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
_GRECAPTCHA6 monthsThis cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks.
cookielawinfo-checkbox-analytics1 yearSet by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Analytics" category .
cookielawinfo-checkbox-functional1 yearThe cookie is set by the GDPR Cookie Consent plugin to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necesaria1 yearSet by the GDPR Cookie Consent plugin to store the user consent for cookies in the category "Necessary".
CookieLawInfoConsent1 yearRecords the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie.
SAVE & ACCEPT
Powered by CookieYes Logo