{"id":3950,"date":"2017-02-14T10:04:24","date_gmt":"2017-02-14T15:04:24","guid":{"rendered":"http:\/\/www.americanbusinessmag.com\/?p=3950"},"modified":"2017-02-14T10:04:24","modified_gmt":"2017-02-14T15:04:24","slug":"visual-privacy-and-the-mobile-worker","status":"publish","type":"post","link":"https:\/\/www.americanbusinessmag.com\/2017\/02\/visual-privacy-and-the-mobile-worker\/","title":{"rendered":"Visual Privacy and the Mobile Worker"},"content":{"rendered":"<h3>Securing the display of sensitive information among a growing mobile workforce<\/h3>\n<p>The mobile workforce today exceeds 96 million U.S. workers and will grow to more than 105 million in 2020, according to a recent IDC study. At that point, mobile workers will make up nearly 75 percent of the U.S. workforce.<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a><\/p>\n<p>The surge in mobile workers has benefited businesses and workers alike. For businesses, it\u2019s created new opportunities to boost productivity, connect employees from anywhere and improve customer responsiveness. For workers, it\u2019s given them greater flexibility to shape their own work schedules and work from home.<\/p>\n<p>But with the benefits of greater worker mobility come new challenges in helping protect the privacy of sensitive company information.<\/p>\n<p><strong><br \/>\nHelping Protect Visual Privacy<\/strong><\/p>\n<p>Workers who access their company\u2019s networks or view sensitive work information in public places too often do so in the full view of others. They don\u2019t use visual controls, such as privacy filters, and they aren\u2019t aware of their surroundings, including potential \u201cshoulder surfers.\u201d<\/p>\n<p>As a result, someone could view or even photograph the information on their screen and they likely wouldn\u2019t even notice. Such threats are known as visual hacking, which is the act of viewing or capturing sensitive, confidential or private information for unauthorized use.<\/p>\n<p>The growing sophistication of smartphone cameras and inconspicuous wearable technology is only making visual hacking easier to pull off and harder for victims to detect. And the ease with which workers in sensitive company positions can now be identified online \u2013 such as through social media posts, professional biographies and upcoming conference participation \u2013 can make them easy targets for visual hackers.<\/p>\n<p><strong><br \/>\nThree Easy Actions<\/strong><\/p>\n<p>Helping prevent visual hacking begins with knowing how to safeguard sensitive information. Three easy actions that any employer can start doing today to reduce the risk of visual hacking to its mobile workers include:<\/p>\n<ol>\n<li><strong>Using privacy products.\u00a0<\/strong>Privacy screens blacken out the angled side view of potential onlookers while providing a clear, unobstructed screen viewfor users. Available for laptops, tablets and smartphones,the privacy screens should be used not only on work devices but also on personal devices that are used for work purposes, even if it\u2019s only on a limited basis.<\/li>\n<li><strong>Updating training.<\/strong>Visual hackers will seize on the careless behaviors and momentary lapses in judgment of mobile workers. Security awareness training can help educate workers about visual hacking and the important role they play in helping prevent it,as well as drive home the need to be continuously aware of potential onlookers in public places.<\/li>\n<li><strong>Implementing policies.<\/strong>Policies should be in place to ensure mobile devices are password protected. They should also help define appropriate behaviors for mobile workers.This includes requiring them to shut down devices when not in use \u2013 even for something as quick as a phone call. It also includes directing workers to angle devices away from potential onlookers, such as seatmates on a train, customers at a coffee shop, or crowds in a hotel lobby, airport or conference.<\/li>\n<\/ol>\n<p>These steps can help any organization, but they\u2019re only a beginning. As the mobile workforce continues to grow, a more comprehensive approach \u2013 beginning with a visual privacy audit \u2013 will be needed to help prevent visual-hacking risks from growing with it.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a>\u00a0IDC Forecasts U.S. Mobile Worker Population to Surpass 105 Million by 2020, IDC,\u00a0 June 23, 2015<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Securing the display of sensitive information among a growing mobile workforce The mobile workforce today exceeds 96 million U.S. workers and will grow to more than 105 million in 2020, according to a recent IDC <a class=\"mh-excerpt-more\" href=\"https:\/\/www.americanbusinessmag.com\/2017\/02\/visual-privacy-and-the-mobile-worker\/\" title=\"Visual Privacy and the Mobile Worker\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":368,"featured_media":3952,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[606],"tags":[],"class_list":{"0":"post-3950","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy"},"_links":{"self":[{"href":"https:\/\/www.americanbusinessmag.com\/wp-json\/wp\/v2\/posts\/3950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.americanbusinessmag.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.americanbusinessmag.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.americanbusinessmag.com\/wp-json\/wp\/v2\/users\/368"}],"replies":[{"embeddable":true,"href":"https:\/\/www.americanbusinessmag.com\/wp-json\/wp\/v2\/comments?post=3950"}],"version-history":[{"count":1,"href":"https:\/\/www.americanbusinessmag.com\/wp-json\/wp\/v2\/posts\/3950\/revisions"}],"predecessor-version":[{"id":3951,"href":"https:\/\/www.americanbusinessmag.com\/wp-json\/wp\/v2\/posts\/3950\/revisions\/3951"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.americanbusinessmag.com\/wp-json\/wp\/v2\/media\/3952"}],"wp:attachment":[{"href":"https:\/\/www.americanbusinessmag.com\/wp-json\/wp\/v2\/media?parent=3950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.americanbusinessmag.com\/wp-json\/wp\/v2\/categories?post=3950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.americanbusinessmag.com\/wp-json\/wp\/v2\/tags?post=3950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}