Wearable Tech: Are You Wearing Your Next Security Breach ‘On Your Sleeve’?

“I look at all devices as endpoints,” said Rick Doten, chief information security officer at DMI. “And there are protection standards for endpoints for encryption, credentials, and vulnerability management. If there are ways to lock down or monitor devices, insert strong credentials, and encrypt, then I don’t have a problem.”