How Easy Would It Be To Hack Your Business?

The most important thing any firm can do to protect itself from hacks – both visual and cyber – is to change the way it thinks 

A cyberattack is a bit like a car crash –something that happens to other people, until it happens to you.  Despite the high-profile and high-cost hacks at the likes of Sony and TalkTalk, awareness of cybersecurity remains patchy at the c-suite. An attitude persists that, so long as you’re paying your anti-virus subs, everything’s fine and dandy. But nothing could be further from the truth.

Take a moment and look around you right now. Can you be sure no one could steal a glance at your screen, whether phone, tablet or desktop monitor, and see what’s on there?  What if you had confidential information on your screen, maybe your company bank accounts, HR records, or sensitive customer data?

Visual hacking may seem lo-tech, but sometimes the old ways are the most effective. After all, why go to the trouble of hiring Russian gangsters to code an ingenious Trojan, when you know your target’s chairman regularly leaves print-outs of top secret company documents on the 19:38 to Letchworth?

In a covert experiment conducted by the Ponemon Institute for 3M, undercover ‘hackers’ were sent into participating offices to expose how easy it was to capture sensitive company information by visual means.  In the UK, they had an astonishing 87% success rate in all visual hacking attempts. A quarter of the time, they took confidential documents, financial information or log-in details without challenge, much of it lifted directly from unprotected computer screens.

The most important thing any firm can do to protect itself from hacks – both visual and cyber – is to change the way it thinks about sensitive data, turning it into a business risk that’s fully understood by the board, not just something fobbed off on the IT department. 

More specifically, organisations can reduce the risks of confidential data been pinched by such measures as installing privacy filters, which prevent screens being viewed at an angle, introducing 2-step logins and training staff in your by now well-thought-through security policy.

Of course, a hack is something that could happen to you, no matter how careful you are. But then that’s true of many risks in business. So long as those risks are understood and where possible contained, it shouldn’t prevent dynamic companies from seeking out the opportunities the modern world brings. 

Management Today

 

« Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night
The Self-Fulfilling Prophecy Of Intelligent Automation »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Nimbusec

Nimbusec

Nimbusec scans your website around the clock and informs immediately if it has been hacked or manipulated

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

The Citadel Department of Defense Cyber Institute (CDCI)

The Citadel Department of Defense Cyber Institute (CDCI)

CDCI is established to address the critical national security needed for a skilled cybersecurity workforce.

Siege Technologies

Siege Technologies

Siege Technologies is a pioneer of multi-purpose cybersecurity products and services that enable customers to leverage both offensive and defensive technologies.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

Darkstrike / Qeros

Darkstrike / Qeros

Complete your defense in-depth strategy with Darkstrike, the world’s most advanced quantum-secure and ransomware-proof data platform for any use case, ensuring unconditional data security.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

B&L PC Solutions

B&L PC Solutions

B&L PC Solutions deliver top cyber security services on Long Island and New York city to protect businesses from evolving online threats.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.