How Easy Would It Be To Hack Your Business?

The most important thing any firm can do to protect itself from hacks – both visual and cyber – is to change the way it thinks 

A cyberattack is a bit like a car crash –something that happens to other people, until it happens to you.  Despite the high-profile and high-cost hacks at the likes of Sony and TalkTalk, awareness of cybersecurity remains patchy at the c-suite. An attitude persists that, so long as you’re paying your anti-virus subs, everything’s fine and dandy. But nothing could be further from the truth.

Take a moment and look around you right now. Can you be sure no one could steal a glance at your screen, whether phone, tablet or desktop monitor, and see what’s on there?  What if you had confidential information on your screen, maybe your company bank accounts, HR records, or sensitive customer data?

Visual hacking may seem lo-tech, but sometimes the old ways are the most effective. After all, why go to the trouble of hiring Russian gangsters to code an ingenious Trojan, when you know your target’s chairman regularly leaves print-outs of top secret company documents on the 19:38 to Letchworth?

In a covert experiment conducted by the Ponemon Institute for 3M, undercover ‘hackers’ were sent into participating offices to expose how easy it was to capture sensitive company information by visual means.  In the UK, they had an astonishing 87% success rate in all visual hacking attempts. A quarter of the time, they took confidential documents, financial information or log-in details without challenge, much of it lifted directly from unprotected computer screens.

The most important thing any firm can do to protect itself from hacks – both visual and cyber – is to change the way it thinks about sensitive data, turning it into a business risk that’s fully understood by the board, not just something fobbed off on the IT department. 

More specifically, organisations can reduce the risks of confidential data been pinched by such measures as installing privacy filters, which prevent screens being viewed at an angle, introducing 2-step logins and training staff in your by now well-thought-through security policy.

Of course, a hack is something that could happen to you, no matter how careful you are. But then that’s true of many risks in business. So long as those risks are understood and where possible contained, it shouldn’t prevent dynamic companies from seeking out the opportunities the modern world brings. 

Management Today

 

« Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night
The Self-Fulfilling Prophecy Of Intelligent Automation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

CyTech Services

CyTech Services

CyTech provides unique services and solutions complemented with professional subject matter experts to both the Federal and Commercial sectors.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

Eversheds Sutherland

Eversheds Sutherland

Eversheds Sutherland is a global multinational law practice offering a full range of commercial and IT law services including Privacy, Data Protection and Cyersecurity.

Seceon

Seceon

Seceon OTM, is a cyber security advanced threat management platform that visualizes, detects, and eliminates threats in real time.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Rezilion

Rezilion

Rezilion is a stealth mode cyber-security start-up developing a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

TXOne Networks

TXOne Networks

TXOne Networks offer cybersecurity solutions to protect your industrial control systems to ensure their reliability and safety from cyberattacks.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

Revytech

Revytech

Revytech is a tech company providing services in a broad range of areas including IT operations, cyber security and network engineering.