Your Top Data-Exposure Risk: Employees

Too many IT departments lack policies to help employees protect data

People are fallible creatures. As the saying goes, nobody’s perfect.

So it should come as no surprise that employees are a top source of data breaches. According to IBM’s latest X-Force cyber-threat report, inadvertent insiders— or people who are unknowingly the root cause of security incidents— were responsible for more than two-thirds of the total records compromised in 2017.1

Certainly, IT departments have worked hard to combat data risks that have a human element, like phishing attacks, but there are other risks that have long gone unaddressed. One of them is the visual display of sensitive data.

You have probably seen someone working in a public place—like a plane, train, coffee shop or hotel lobby—with the contents of their laptop screen on full display for others to see. Such incidents can expose data and result in a data breach that you may never be able to trace back to a time, place or person.

This is why it’s important to understand visual privacy risks and the steps you can take to mitigate them.

Drawing an Audience

The visual display of sensitive information should be a concern for any IT department that gives workers network access outside the office.

Case in point: Almost nine of 10 mobile workers say they’ve experienced someone looking over their shoulder at their laptop in public places, according to a Ponemon Institute study.2

This “shoulder surfing” may be nothing more than random curiosity or it may have malicious intent.

Visual hacking involves capturing or viewing private, sensitive or confidential information for unauthorized use. Any passerby in public places or fellow passenger on public transit could visually hack data shown on a screen with a quick, unnoticed tap of their smartphone. They could even remember or quickly jot down displayed information, like company finances, a customer’s credit-card number or a worker’s network log-in. With high-quality CCTV cameras everywhere, the visual hacker might not even be in the same room.

What You Can Do

Here are four ways that IT and information-security departments can help protect data on screens:

Architect. Designing privacy-friendly systems that minimize the use of sensitive data.

Secure. Hiding sensitive data from potential threats and avoiding unnecessary details.

Supervise. Enforcing policies and procedures for the appropriate use of data, and then demonstrating compliance with them.

Balance. Informing individuals about the collection or use of their data, and giving them some control over that data.

While all four can serve as important controls, supervision is one area where many organizations fall short. Too often, workers simply don’t have guidance for accessing sensitive data in public areas or even protecting visual privacy in the workplace.

Policies should be in place to outline if, when and how mobile workers can access sensitive data on laptops or mobile devices. Policies should also provide guidance for minimizing data exposure when accessing data in public is necessary, such as by angling screens away from public spaces and maintaining a clean workspace.

Of course, data privacy shouldn’t entirely rely on worker behaviors because, again, to err is human. Enforcing policies is hard and demonstrating worker compliance with policies is expensive and timeconsuming. This is why policies need supporting technical measures that provide added protection in instances of employee negligence.

For example, providing privacy filters and requiring their use on all laptop or mobile device screens, including personal devices used for work, supports employees when they forget to angle their screen away from prying eyes. The privacy filter attaches to a device’s screen and blacks out the angled view of onlookers to help reduce the risk of visual hacking.

You can also use location-based access controls to help prevent workers from viewing sensitive data outside the office. You can use practices like data masking to limit the display of sensitive data. There are many opportunities for technology to support policy objectives.

An Expectation of Privacy

We’re in a new era of data protection. Today, amid new regulations like GDPR and fresh stories about data misuse, there are expectations among customers and internal stakeholders alike that companies be better stewards of data.

Strong cyber-security measures can help you meet these expectations, bu policies, procedures and technology that help limit the visual display of sensitive data—especially as it becomes more mobile— can no longer be avoided.

This article originally appeared in the September 2018 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3