A hacker often only needs one piece of valuable information to unlock a large-scale data breach.
What Is Visual Hacking – And How To Prevent It Happening To You
Hello Tech Lovers!
While most companies focus on intercepting data breaches from high-tech cyber attacks, a study has exposed visual hacking – a low-tech method used to capture sensitive, confidential and private information, as an under-addressed corporate risk.
The Visual Privacy Advisory Council and 3M conducted an experiment from which the results may surprise you. In almost nine out of ten attempts (88%), a white hat hacker was able to visually hack sensitive company information – credentials that could potentially put a company at risk for a much larger data breach. A quick glance is all it takes for visual hackers to gain valuable information and sensitive data. Passwords, account information and even website code are all vulnerable to hackers.
During the study, an average of five pieces of information were visually hacked per trial, including:
- Employee contact lists (63%)
- Customer information (42%)
- Corporate financials (37%)
- Employee access & login information/credentials (37%)
- Information about employees (37%)
Visual hacking happens quickly: Companies can be visually hacked in a matter of minutes, 45% occurring in less than 15 minutes and, 63% of visual hacks occurring in less than 30. Visual hacking generally goes unnoticed. Unprotected devices such as laptops pose the greatest opportunity for sensitive information to be visually hacked. 53% of information deemed sensitive (access or login credentials, confidential or classified documents, financial, accounting, budget information or attorney-client privileged documents) were gleaned by the visual hacker from the computer screen.
If you use a laptop in a public area such as on a train, at an airport or cafe you are even more open to attack. That’s were our PROHOOD® can help you thwart the visual hackers. PROHOOD® is a lightweight, hard, protective laptop case with an integrated privacy shield. The shield, is quick and easy to deploy, it can be opened in seconds.
- In those companies that employed the use of privacy shields, 50% of trials saw three or less information types visually hacked
- while 43% of companies that did not use privacy shields saw four or more information types visually hacked.
See the full report here
Adam – MNK Founder