3 Ways to Protect Your Wearables and Rugged Devices From Cyber Attacks

It’s time to treat non-traditional endpoint security with the same urgency as smartphones and laptops. Here’s how.

Written by Apu Pavithran
Published on Aug. 14, 2024
A fish tank with a lot of aquatic plants.
Image: Shutterstock / Built In
Brand Studio Logo

Anything with an internet connection is hackable. And yes, this includes enterprise endpoints like wearables, rugged devices and even signage systems.

These non-traditional devices are among the most targeted devices, since they often fly under the cybersecurity radar. Hackers know these endpoints are more likely to go without the latest software updates or strong password practices. Then, once compromised, these devices can serve as network entry points.

It’s something we see all too often and something that, if left unremedied, will only get worse.

The average enterprise already runs about 135,000 endpoints, and the number of connected devices globally will more than double within the next 10 years from around 20 billion to almost 40 billion. This proliferation of devices, from security cameras to industrial control systems, presents an expanding attack surface for bad actors targeting enterprise networks.

It’s past time to fight back. Information technology can no longer afford to treat non-traditional devices as second-class endpoints.

Strong security across the network is possible. Let’s explore.

How Can You Improve Cybersecurity for Your Wearables?

  1. Practice thorough, consistent patch management to seal potential entry points.
  2. Assume that anything that can be hacked will be hacked, and implement zero-trust architecture.
  3. Centralize device management with unified endpoint management.

More by This AuthorThe IoT Needs to Enter Its Secure Age Right Now

 

Why Are Non-Traditional Devices Overlooked?

Non-traditional endpoints can lead to costly, reputation-damaging breaches.

Today, the average data breach costs $4.88 million, a 10 percent increase from last year. IoT security remains a top concern for enterprises this year thanks to the double whammy of weak endpoints and active hackers.

Devices containing vulnerabilities have surged by 136 percent compared to a year ago, according to Forescout’s The Riskiest Connected Devices in 2024 report, and hackers are taking advantage of this security backdoor boom. About one-quarter of organizations reported a serious IoT security incident in the past year.

For example: A connected aquarium filter might seem harmless until it becomes an entry point, as happened when attackers accessed a casino’s sensitive data this exact way. As sensors shrink and chip costs plummet, more unlikely objects will join networks, creating potential backdoors.

One problem is that IT isn’t treating wearables and rugged devices with the same import as smartphones and laptops, even though wearables in the workplace are still personal devices that can come with increased exposure to malware and viruses.

Rugged devices like industrial barcode scanners, meanwhile, are strong on the outside but weak on the inside. Managing this subset of hardware — specially designed to withstand tough environmental conditions like extreme temperatures, dust, water and other elements — is often difficult thanks to remote settings configurations, missed security patches and outdated software.

 

3 Cybersecurity Tips for Non-Traditional Devices

To fortify enterprise front lines against the threats to non-traditional devices, IT should focus on three critical strategies. 

1. Prioritize Patching Legacy Vulnerabilities

Research reveals that 34 of the 39 most exploited IoT vulnerabilities are more than three years old, according to the IoT Tech Today study above. This underscores the urgent need for timely updates to close potential entry points for attackers.

Good patch management starts with a wider vulnerability management program, ensuring that IT understands its assets and specific vulnerabilities. This includes constantly checking for holes with regular device audits, patch testing and rollback plans.

Then, set a strategy for implementing patches by establishing alerts and monitoring the big tech players for new releases. Apple, for example, hosts a dedicated page detailing new threats and security information.

2. Implement Zero-Trust Architecture and Ethos

The zero-trust approach, based on the principle of “never trust, always verify,” assumes that anything that can be hacked will be hacked and works backward.

For identity verification, for example, set strong passwords backed by multi-factor authentication, and even consider passwordless technology like biometrics and passkeys. Effective threat monitoring, continuous maintenance and adherence to governance and compliance standards go a long way.

By adopting this mindset, organizations can significantly enhance their security posture across all connected devices. This ensures that even if a bad actor compromises one endpoint, they can’t move laterally through the network.

3. Adopt Unified Endpoint Management

Gartner recently highlighted the importance of unified endpoint management in providing crucial contextual authentication and data management capabilities. These platforms help to centralize device management with a user-centric view of the entire ecosystem and everything connected.

As a result, UEM streamlines security efforts and helps businesses achieve a more comprehensive and effective defense against evolving cyber threats. Onboarding such a tool should be a top priority for the coming years of non-traditional devices and general internet-connected assets.

More on IoT SecurityIoT Security is a Challenge. Here’s How to Tackle It.

 

Don’t Become A Cybersecurity Statistic

Enterprises must intensify efforts to avoid becoming cybersecurity statistics. The aforementioned research from Forescout reveals that device vulnerabilities doubled from last year to this year, with one-third of IoT devices reported to have vulnerabilities.

This trend demands heightened cybersecurity focus and proactive defense strategies.

To outpace malicious actors this decade, enterprises must prioritize software patching, zero trust adoption and UEM implementation. The future of endpoint security depends on protecting not just the obvious, but also the overlooked.

Explore Job Matches.