Monday, July 13, 2020

The Security of Smart Gadgets

Brought to you by:


(650) 348-6234

If you’re Inspector Gadget, you might say, “Go-go gadget security!” but for the rest of us we’re stuck with the task of keeping our smartphones, tablets, wearable technology, and any other connected devices (collectively known as the “Internet of Things”) secure. For individual users, this represents a minor issue and some may not even give it a second thought, but for corporations of all sizes, data security is a huge concern.

This technology is already commonplace in the workforce, but as more and more devices are being added and used for productivity, so too does their hacking vulnerability increase. It’s not just personal information that’s at risk, but if that device is tied into the company, then the company’s data may be compromised. In an article on Society for Human Resource Management’s (SHRM) website titled, “Fitbits, Smartwatches and Workplace Security,” it is recommended that whoever is in charge of a company’s technology must weigh the options of the desire to collect and analyze data with the risks of loss or misuse. New business models and value propositions need to take that risk into account.

One of the ways to reduce that risk is by educating employees on the security risks associated with their devices. Employees may not recognize the severity of the risk, or even be aware that a risk is posed at all. The article states that good cybersecurity training is money well-spent when you consider the potential expense of dealing with a breach in data security.

However, any employee education and training must be done so as not to be frightening or threatening. It’s crucial to follow cybersecurity protocols and policies, but these can be more effectively followed with behavior and attitude changes versus punishment. One of the ways to affect an employee’s behavior is to reinforce their desire for privacy. As the corporate culture shifts from one of apathy toward data security to one of diligence, it will be much easier to maintain a low risk being breached.

Copyright © 2001-2012 United Benefit Advisors, LLC. All Rights Reserved Terms Of Use Privacy Statement