3M Screen Privacy Explainer

0:00
Video Narration
12
2

Description

This is a fun explainer showcasing the dangers of visual hacking

Vocal Characteristics

Language

English

Voice Age

Middle Aged (35-54)

Accents

North American (General) North American (US General American - GenAM)

Transcript

Note: Transcripts are generated using speech recognition software and may contain errors.
to see how easy it is to steal sensitive company information through visual hacking. We worked with 1/3 party organisation to conduct a covert experiment in which an undercover visual hacker was sent into several corporate participating offices. The goal was to see if they could obtain sensitive or confidential information using Onley Visual means. Shockingly, the visual hacker was able to obtain sensitive information in 88% of the trials. There are more alarming findings. One visual hacking happens quickly. In nearly half of the trials, the visual hacker obtained high level company information in 15 minutes or less. It's hard to believe, but it's that easy to multiple pieces of information are hat visual. Hacker got his eyes on an average of five pieces of sensitive information for trial, including corporate financials. In confidential employee and customer information, take away cos air not only likely to be hit but to be hit from multiple directions at once. Three. Visual hacking is unnoticed. Visual hacker was stopped in only 30% of attempts. Even then, it was too late. On average, 2.8 pieces of sensitive information were still obtained for interrupted incident. Even more concerning 70% of the time. Visual hacking with either unnoticed or unchallenged by employees, which means protecting your organization is up to you. A lot of eyes move through the office every day. Employees, contractors, even visitors and anyone can be a visual hacker. Help protect your organization. Sensitive information By equipping all your screams with three M brand privacy filters, which help lock side views from visual hackers. We're providing a clear view for the user, and you can clearly see privacy is the best policy.