Connected objects in outdoor sports: companions to pamper! – EconomyMorning



Having become our best friends during our outdoor sports practices, connected objects (IoT) are also among the most permeable to cyber-attacks. Focus on the right reflexes to have. This is the winning cocktail for athletes this month of April: the tightening of the confinement combined with the arrival of spring is proving to be favorable to the massive practice of outdoor sport. Jogging around the house, outings in the forest with friends keen on Nordic walking, family runs in the parks Here is the great return of the effort and the questions that are traditionally associated with it. What is our individual fitness level? How to improve it? Where do we stand in relation to our past performance? In this case, the IoT turns out to be the most appropriate resource, the most natural but also one of the most tricky in terms of security. The IoT, an invisible field to monitor Glasses, cameras, key rings, scales, lamps, activity monitors, watches, clothing The range of connected objects is wide and has penetrated both the industrial and high-tech spheres and domestic, in line with our social practices. The territory of sport is of course not to be outdone. From tennis to golf (racket or club capable of analyzing the player’s strokes), from swimming to football (waterproof bracelets capturing performance, connected shoes), not to mention cycling or skiing, the Internet of Things is on the way to interfere in our lives to the point of forgetting certain essential rules. The IoT is so deeply embedded in our daily habits that connected objects have almost become invisible. As a result, we no longer ask ourselves the question of the usual precautions: we should nevertheless Have the right approach What are, in this case, the best practices? We must first keep in mind that in an outdoor sport situation two objects are particularly to be considered: our mobile phone on one side, and our connected watch on the other – both of which are most often interconnected. one to the other … Anyway, it is both a matter of identifying where the data is (particularly sensitive) and estimating their level of protection. Photos, data on your health, geolocation Prioritize the point on the protection methods that you have set up on your mobile phone or your connected watch. Is the data accessible by third parties? Agrave; who are they likely to be transmitted? Here are some of the good questions to ask yourself. Also distrust of wifi connections in public spaces. The terminals on which our connected objects are grafted are far from being all protected, and it is a question of being aware of this at all times. Some flaws that we don’t think much about There are also other flaws that individuals think little about, in connection with the second life of our connected objects. The purchase such as the sale of a smartphone or a connected watch to a friend, a colleague or a third party (via a specialized platform for example) requires some preliminary precautions. Here, of course, you have to make sure that none of the data collected on your smartphone or your connected watch is kept there. Despite these protections, however, a breach does occur. This is where security solutions come in handy, especially on Android technology. Ransomware shield, real-time protection, anti-phishing, the tools available on the market offer certain options in the event of an attack. They also allow real-time analysis of downloads and conversations that take place, detecting any unwanted programs or files. However, the best solution of all is foresight and anticipation: ask yourself the right questions before any session. The resumption of outdoor sport, if it requires a certain physical preparation, must indeed be accompanied by technical preliminaries which are the corollary. Another way of saying that body hygiene now matches that of our best connected friends