HP Tech@Work
Today's trends for tomorrow's business
You are vulnerable to visual hacking...

You are Vulnerable to Visual Hacking...

Passwords. Biometrics. BIOS backups. Anti-viruses. Businesses put a lot of time and effort into protecting sensitive information, but many overlook the most low-tech form of theft—stealing a glance at someone's computer screen. Or as it's also known: visual hacking.
Are you vulnerable to visual hacking? Yes. But you're not helpless.
Here's what you need to know about visual hacking, and how recent innovations can help you protect your on-screen information from prying eyes.

What is it?

Visual hacking is the act of viewing or capturing sensitive, confidential, or private information for unauthorized use.
Visually-hacked information can be displayed on a PC or electronic device, or it could be on a paper document left out in the open—such as on your desk, in a print tray, or even at your local coffee shop. And it's a surprisingly common occurrence.
From casual evenings with your family to work sessions with your colleagues, chances are you've glanced at someone's screen and seen something they didn't want you to see—whether they're surfing social media, shopping online, or handling personal information.
When there is sensitive information and criminal intent involved, however, what might seem like a simple annoyance or transgression can quickly transform into a serious problem.

How dangerous is it?

Very dangerous.
A visual hacker may only need one piece of information to expose a company to a data breach, which in turn can cost companies millions of dollars in lost business, regulatory fines, and legal expenses. The average annual cost of cybercrime last year was $15.4 million per large U.S. company.[1]
Visual hacking also has extremely high success rates.
In a recent visual hacking experiment conducted for 3M and the Visual Privacy Advisory Council, 90% of visual hacking attempts were successful, with nearly four pieces of private information visually hacked per trial.2 It's a very fast process, too. It takes a hacker less than 15 minutes to complete their first visual hack 45% of the time.[2]
And the risk is increasing thanks to an ongoing shift towards open workspaces, where walls and cubicles have come down. In that same 3M study, open workspaces resulted in nearly 50% more information types being visually hacked versus a traditional office layout.[2]
Visual hacking can also impact employee productivity, given almost 60% of employees take their work outside of office walls.[4] A similar study by Ponemon Institute also found that employees using a visual privacy solution can be twice as productive when working in close proximity to others.[5]

Who is vulnerable?

According to researchers, visual hacking is a pervasive problem that “occurs in all industry sectors and at all levels of an organization.”[2] It doesn't matter if you're an intern or a C-suite executive—if you access or handle sensitive information, you're vulnerable to visual hacking.
While every hacker will have their own purpose and target, popular targets of visual hacking include:
  • Payment Card Information (PCI)
  • Personally Identifiable Information (PII)
  • Account numbers
  • Credit history
  • Social security numbers
Luckily, there are steps you can take to protect yourself and your business from the dangers of visual hacking.

How do I protect my sensitive information?

  • Step 1: Before you access sensitive information, assess your situation to see how vulnerable you are. If you're in a crowded location, such as a coffee shop or an airplane, consider relocating to somewhere more private or working on something else until you're less exposed.
  • Step 2: Discuss the issue with senior management and work to implement organization-wide awareness and prevention training. In other words, institute a visual privacy strategy.
  • Step 3: Assess whether employees, contractors, and visitors have too much access to sensitive information in workspaces and/or offsite locations. If so, consider blocking off parts of the office from visitors and non-department members or setting up internal firewalls.
  • Step 4: Invest in the right tools, such as the HP Sure View integrated privacy screen that helps to protect information on your notebook screen at a touch of a button. HP Sure View is available as an option on the HP EliteBook 1040 G3 and 840 G3—the world's only PCs with integrated privacy screens.[3] Activated by pressing FN + F2, visual protection starts to occur when others are looking at the screen at 35° from the center. Beyond that, the content is obscured by reducing up to 95% of the visible light, hindering any would-be visual hackers.
For your existing notebook PCs, HP Privacy Filter designed by 3M™ delivers similar functionalities as HP Sure View in a removable, flat front surface (the thinnest solution of its kind to date). When applied, the notebook screen fades to black starting at a 30-degree viewing angle and effectively “blacks out” the screen beyond a 60-degree viewing angle. HP Privacy Filter supports both touch and non-touch notebooks up to 15.6” and is available for select models in the 600-1000 HP notebook series.

It's time for action

Your security is only as strong as its weakest link. Visual hacking is a potent threat to businesses and individuals, but with a sound approach and the right security tools you can effectively safeguard your sensitive information against prying eyes. Start here to establish a secure visual privacy strategy—and remember to follow up at regular intervals to gauge the effectiveness and adjust accordingly.
[1] Ponemon Institute, Global Report on the Cost of Cyber Crime
[2] Ponemon Institute and 3M, 3M Visual Hacking Experiment
[3] Based on currently available, in-market PCs, as of April 2016. Available on select HP EliteBooks only.
[4] Pew Research Center, Technology's impact on Workers
[5] Ponemon Institute, Visual Privacy Productivity Study

Disclosure: Our site may get a share of revenue from the sale of the products featured on this page.


Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by HP.com; reseller offers may vary. Items sold by HP.com are not for immediate resale. Orders that do not comply with HP.com terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.

HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price

The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at https://support.microsoft.com/lifecycle

Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.

HP will transfer your name and address information, IP address, products ordered and associated costs and other personal information related to processing your application to Bill Me Later®. Bill Me Later will use that data under its privacy policy.

Microsoft Windows 10: Not all features are available in all editions or versions of Windows 10. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows 10 functionality. Windows 10 is automatically updated, which is always enabled. ISP fees may apply and additional requirements may apply over time for updates. See http://www.microsoft.com.

HP Rewards qualifying and eligible products/purchases are defined as those from the following categories: Printers, Business PCs (Elite, Pro and Workstation brands), select Business Accessories and select Ink, Toner & Paper.