How Easy Would It Be To Hack Your Business?

The most important thing any firm can do to protect itself from hacks – both visual and cyber – is to change the way it thinks 

A cyberattack is a bit like a car crash –something that happens to other people, until it happens to you.  Despite the high-profile and high-cost hacks at the likes of Sony and TalkTalk, awareness of cybersecurity remains patchy at the c-suite. An attitude persists that, so long as you’re paying your anti-virus subs, everything’s fine and dandy. But nothing could be further from the truth.

Take a moment and look around you right now. Can you be sure no one could steal a glance at your screen, whether phone, tablet or desktop monitor, and see what’s on there?  What if you had confidential information on your screen, maybe your company bank accounts, HR records, or sensitive customer data?

Visual hacking may seem lo-tech, but sometimes the old ways are the most effective. After all, why go to the trouble of hiring Russian gangsters to code an ingenious Trojan, when you know your target’s chairman regularly leaves print-outs of top secret company documents on the 19:38 to Letchworth?

In a covert experiment conducted by the Ponemon Institute for 3M, undercover ‘hackers’ were sent into participating offices to expose how easy it was to capture sensitive company information by visual means.  In the UK, they had an astonishing 87% success rate in all visual hacking attempts. A quarter of the time, they took confidential documents, financial information or log-in details without challenge, much of it lifted directly from unprotected computer screens.

The most important thing any firm can do to protect itself from hacks – both visual and cyber – is to change the way it thinks about sensitive data, turning it into a business risk that’s fully understood by the board, not just something fobbed off on the IT department. 

More specifically, organisations can reduce the risks of confidential data been pinched by such measures as installing privacy filters, which prevent screens being viewed at an angle, introducing 2-step logins and training staff in your by now well-thought-through security policy.

Of course, a hack is something that could happen to you, no matter how careful you are. But then that’s true of many risks in business. So long as those risks are understood and where possible contained, it shouldn’t prevent dynamic companies from seeking out the opportunities the modern world brings. 

Management Today

 

« Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night
The Self-Fulfilling Prophecy Of Intelligent Automation »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infinigate UK

Infinigate UK

Infinigate is a value-added distributor of IT security solutions to protect and defend IT networks, servers, devices, data, applications, as well as the cloud.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

SecureWorks

SecureWorks

SecureWorks provides intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

Watchcom Security Group

Watchcom Security Group

Watchcom is one of Norway's foremost suppliers of information security consultancy services.

Cyber London (CyLon)

Cyber London (CyLon)

CyLon is a leading cyber security accelerator and seed investment programme. We help entrepreneurs from across the globe to build cyber security businesses, raise investment, and develop partnerships.

OpenText

OpenText

OpenText is a leader in Enterprise Information Management software and a portfolio of related solutions for Information Governance, Compliance, Information Security and Privacy.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

BwCIRT

BwCIRT

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana and provides an official point of contact for dealing with computer security incidents.

NSA Career Development Programs

NSA Career Development Programs

NSA offers entry-level programs to help employees enhance their skills, improve their understanding of a specific discipline and even cross-train into a new career field.

Cyber Pop-Up

Cyber Pop-Up

Cyber Pop-Up provide on-demand access to top security experts. No recruiting. No onboarding. No overhead costs.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

Inveteck Global

Inveteck Global

Inveteck Global is a Ghana-based cyber security firm providing strategic guidance and technical solutions to all our clients to best serve their individual needs.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

Patero

Patero

Patero provides cybersecurity technology solutions that make your data indecipherable with quantum-safe encryption.