For Subscribers

The Low-Tech Hack You're Not Prepared For Haven't heard of visual hacking? It could be a real threat to your business, says Daniel Burks, senior VP and enterprise chief privacy officer for U.S. Bank.

By Mikal E. Belicove

This story appears in the September 2016 issue of Entrepreneur. Subscribe »

Shutterstock

We're inundated with terrifying tales of computer hacking. But seldom discussed is the relatively low-tech act of visual hacking: That's when a snoop sneaks a peek at or photographs your sensitive information. In a Ponemon Institute experiment conducted on behalf of 3M and the Visual Privacy Advisory Council, an undercover hacker posing as a contractor or part-time worker was able to obtain sensitive info (like log-in credentials) 88 percent of the time.

Related: Cyber Security a Growing Issue for Small Business

Heighten awareness:

In the Ponemon Institute study, employees did nothing to stop the undercover operative 70 percent of the time. Be sure to inform your staff of the risks of visual hacking, and have them memorize "the three Rs": 1. Refrain from sharing key customer or business information with others. 2. Remove such information from business forms and documents where possible. 3. Redact the sensitive information that cannot be removed.

Reduce vulnerability:

Identify places where confidential materials are stored, such as workstations, printer and fax areas or conference room whiteboards. The more public the workspace, the more tightly you'll want to lock it down. Place shredders or secured waste containers where only authorized personnel can access them. Keep documents out of plain sight by using printers with a "locked print" option (which requires passcode entry upon pickup) and instituting a clean-desk policy.

Related: 10 Questions to Ask When Creating a Cybersecurity Plan for Your Business

Protect your screens:

This is going to sound paranoid, but Burks says it's for real: If you have computer screens in public areas, position them in a way that makes them hard to snoop on, and use password-­protected screensavers. Privacy filters (films that block side views of your screen) are your friend, especially on laptops or smartphones that employees use outside the office. And consider where visual hacking and computer hacking can intersect: Check that wi-fi security cameras aren't aimed at confidential information and are protected by strong passwords.

Mikal E. Belicove is a market positioning, social media, and management consultant specializing in website usability and business blogging. His latest book, The Complete Idiot’s Guide to Facebook, is now available at bookstores. 

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Business Ideas

70 Small Business Ideas to Start in 2025

We put together a list of the best, most profitable small business ideas for entrepreneurs to pursue in 2025.

Business News

AI Could Cause 99% of All Workers to Be Unemployed in the Next Five Years, Says Computer Science Professor

Professor Roman Yampolskiy predicted that artificial general intelligence would be developed and used by 2030, leading to mass automation.

Business News

Mark Zuckerberg 'Insisted' Executives Join Him For a MMA Training Session, According to Meta's Ex-President of Global Affairs

Nick Clegg, Meta's former president of global affairs, says in a new book that he once had to get on the mat with a coworker.

Buying / Investing in Business

Big Investors Are Betting on This 'Unlisted' Stock

You can join them as an early-stage investor as this company disrupts a $1.3T market.

Business News

United Airlines Says It Is Adding Extra Flights in Case Spirit 'Suddenly Goes Out of Business'

Rival airlines, including United and Frontier, are adding new routes as Spirit cuts 12 cities from its schedule.