Your Top Data-Exposure Risk: Employees

Too many IT departments lack policies to help employees protect data

People are fallible creatures. As the saying goes, nobody’s perfect.

So it should come as no surprise that employees are a top source of data breaches. According to IBM’s latest X-Force cyber-threat report, inadvertent insiders— or people who are unknowingly the root cause of security incidents— were responsible for more than two-thirds of the total records compromised in 2017.1

Certainly, IT departments have worked hard to combat data risks that have a human element, like phishing attacks, but there are other risks that have long gone unaddressed. One of them is the visual display of sensitive data.

You have probably seen someone working in a public place—like a plane, train, coffee shop or hotel lobby—with the contents of their laptop screen on full display for others to see. Such incidents can expose data and result in a data breach that you may never be able to trace back to a time, place or person.

This is why it’s important to understand visual privacy risks and the steps you can take to mitigate them.

Drawing an Audience

The visual display of sensitive information should be a concern for any IT department that gives workers network access outside the office.

Case in point: Almost nine of 10 mobile workers say they’ve experienced someone looking over their shoulder at their laptop in public places, according to a Ponemon Institute study.2

This “shoulder surfing” may be nothing more than random curiosity or it may have malicious intent.

Visual hacking involves capturing or viewing private, sensitive or confidential information for unauthorized use. Any passerby in public places or fellow passenger on public transit could visually hack data shown on a screen with a quick, unnoticed tap of their smartphone. They could even remember or quickly jot down displayed information, like company finances, a customer’s credit-card number or a worker’s network log-in. With high-quality CCTV cameras everywhere, the visual hacker might not even be in the same room.

What You Can Do

Here are four ways that IT and information-security departments can help protect data on screens:

Architect. Designing privacy-friendly systems that minimize the use of sensitive data.

Secure. Hiding sensitive data from potential threats and avoiding unnecessary details.

Supervise. Enforcing policies and procedures for the appropriate use of data, and then demonstrating compliance with them.

Balance. Informing individuals about the collection or use of their data, and giving them some control over that data.

While all four can serve as important controls, supervision is one area where many organizations fall short. Too often, workers simply don’t have guidance for accessing sensitive data in public areas or even protecting visual privacy in the workplace.

Policies should be in place to outline if, when and how mobile workers can access sensitive data on laptops or mobile devices. Policies should also provide guidance for minimizing data exposure when accessing data in public is necessary, such as by angling screens away from public spaces and maintaining a clean workspace.

Of course, data privacy shouldn’t entirely rely on worker behaviors because, again, to err is human. Enforcing policies is hard and demonstrating worker compliance with policies is expensive and timeconsuming. This is why policies need supporting technical measures that provide added protection in instances of employee negligence.

For example, providing privacy filters and requiring their use on all laptop or mobile device screens, including personal devices used for work, supports employees when they forget to angle their screen away from prying eyes. The privacy filter attaches to a device’s screen and blacks out the angled view of onlookers to help reduce the risk of visual hacking.

You can also use location-based access controls to help prevent workers from viewing sensitive data outside the office. You can use practices like data masking to limit the display of sensitive data. There are many opportunities for technology to support policy objectives.

An Expectation of Privacy

We’re in a new era of data protection. Today, amid new regulations like GDPR and fresh stories about data misuse, there are expectations among customers and internal stakeholders alike that companies be better stewards of data.

Strong cyber-security measures can help you meet these expectations, bu policies, procedures and technology that help limit the visual display of sensitive data—especially as it becomes more mobile— can no longer be avoided.

This article originally appeared in the September 2018 issue of Security Today.


  • Live From ISC West: Day 2 Recap

    If it’s even possible, Day 2 of ISC West in Las Vegas, Nevada, was even busier than the first. Remember to keep tabs on our Live From ISC West page for news and updates from the show floor at the Venetian, because there’s more news coming out than anyone could be expected to keep track of. Our Live From sponsors—NAPCO Security, Alibi Security, Vistacom, RGB Spectrum, and DoorKing—kept the momentum from Day 1 going with packed booths, happy hours, giveaways, product demonstrations, and more. Read Now

    • Industry Events
    • ISC West
  • Visiting Sin City

    I’m a recovering alcoholic, ten years sober this June. I almost wrote “recovered alcoholic,” because it’s a problem I’ve long since put to bed in every practical sense. But anyone who’s dealt with addiction knows that that part of your brain never goes away. You just learn to tell the difference between that insidious voice in your head and your actual internal monologue, and you get better at telling the other guy to shut up. Read Now

  • On My Way Out the Door

    To answer that one question I always get, at every booth visit, I have seen amazing product technology, solutions and above all else, the people that make it all work. Read Now

    • Industry Events
    • ISC West
  • Return to Form

    My first security trade show was in 2021. At the time, I was awed by the sheer magnitude of the event and the spectacle of products on display. But this was the first major trade show coming out of the pandemic, and the only commentary I heard was how low the attendance was. Two representatives from one booth even spent the last morning playing catch in the aisle with their giveaway stress balls. Read Now

    • Industry Events
    • ISC West
Most   Popular

Featured Cybersecurity

New Products

  • D-Tools System Integrator (SI) Software

    D-Tools System Integrator (SI) Software

    D-Tools Inc. has announced the availability of System Integrator version 16, which adds powerful new project and service management capabilities to its award-winning, end-to-end business management solution. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • BriefCam v6.0

    BriefCam v6.0

    BriefCam has released BriefCam v6.0, which introduces the new deployment option of a multi-site architecture. This enables businesses with multiple, distributed locations to view aggregate data from all remote sites to uncover trends across locations, optimize operations and boost real-time alerting and response – all while continuing to reap the benefits of BriefCam's powerful analytics platform for making video searchable, actionable and quantifiable. 3