author photo
By Bruce Sussman
Wed | Feb 6, 2019 | 6:55 AM PST

An Internet of Things watch that helps parents track their children is being recalled because of cybersecurity and privacy risks.

The IoT watch is called the "Safe-Kid-One," and it is marketed on the way it taps into the power of the IoT. Says the company website:

"A High Tech SIM/GPS Safety and Surveillance Smart Watch for Kids. You can Keep an Eye on, Talk to and Watch over your Kid Everywhere and All the Time"

smart-watch-image-eu-commission

According to the EU, you're not the only one who can track your child with this smartwatch. The EU issued a Rapid Alert recall about the watch made by ENOX.

"The mobile application accompanying the watch has unencrypted communications with its backend server and the server enables unauthenticated access to data. As a consequence, the data such as location history, phone numbers, serial number can easily be retrieved and changed.

A malicious user can send commands to any watch making it call another number of his choosing, can communicate with the child wearing the device or locate the child through GPS."

That certainly presents a frightening scenario where cybersecurity impacts personal security, doesn't it?

IoT devices increase business risk

And this reminds us of a viewpoint about the IoT's impact on business risk that was featured in our article, "10 Quotes on Privacy Worth Reading." 

"Consider this: If you have 100 employees, and they each use an average of two smart devices within your business processing environment, you’ve just created at least another 200 data storage areas," says Rebecca Herold, CEO of The Privacy Professor.

"Add in all the third parties that are getting copies of the data, and that number exponentially increases. How can organizations safeguard and control all that data in all those other, unknown, storage areas? This opens up the organization to many additional security, privacy, and legal risks."

There is no stopping the growth of the Internet of Things, but there certainly are serious challenges that remain when it comes to security, privacy, and risk in this area.

Comments