Wearables in Insurance: Balancing Value and Vulnerabilities
Security vulnerabilities exist in a number of areas; data sent from a wearable device to a nearby smartphone, for example, may be exposed during transfer via Bluetooth or WiFi connections.
To continue, please sign in or become a member.
Join the INN community
MEMBERSHIP IS FREE
- Full access to the industry's most comprehensive daily report, including news, analysis and insight.
- Daily, weekly, and topic-based newsletters and alerts.
- Web seminars, white papers, and research from authoritative contributors.
Have an account?
SIGN IN HERE