Page 9 - Cyber Warnings
P. 9







The result: data is more accessible, and more exposed than ever before. This can create
opportunities for insider threats or for other ill-willed individuals known as visual hackers, who
can capture exposed data with something as simple and ubiquitous as a smartphone camera.



Updating Privacy and Security Efforts

Security and privacy policies must be revised to address the visual privacy and security risks
that come with going paperless. This should begin with privacy and security audits. From there,
the appropriate mitigation methods can be implemented based on the identified risks or threats.

One of the easiest measures to implement in a paperless workplace is privacy filters. They
apply directly to the screen of a laptop, desktop monitor, smartphone or other mobile device to
blacken out the side angled views of onlookers. Additionally, device screens themselves should
be directed away from public areas to reduce the risk of exposing data to unauthorized
individuals.

Organizations should also train workers to be aware of their surroundings. Visual hackers are
like any other hacker in that they want to exploit security gaps – and those gaps can come in the
form of workers who let their guards down for mere seconds.

It’s also important that security and privacy efforts don’t become lax when it comes to physical
documents, as most organizations likely won’t ever be 100 percent paperless. Documents
should be destroyed after they are electronically scanned. Printers and fax machines should be
kept in secure locations. And clean-desk policies should be enforced.

By implementing these basic but important measures, organizations can realize the benefits of
going paperless and help protect the privacy and security of their most valuable data in the
process.



About the Author

Mari Frank, an attorney and certified privacy expert, is the author of the "Identity Theft Survival
Kit," "Safe Guard Your Identity," "From Victim to Victor," and "The Guide to Recovering from
Identify Theft." Since 2005, she's been the radio host of "Privacy Piracy," a weekly show on
KUCI 88.9 FM in Irvine, CA and Kuci.org, dealing with privacy issues in the information age.
She consults with companies on privacy issues and mediates privacy disagreements so
disputants can resolve their privacy/technology issues privately and confidentially without a
court battle.










9 Cyber Warnings E-Magazine – July 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   4   5   6   7   8   9   10   11   12   13   14