About Visual Hacking

The data is in. Visual hackers are out there, and 3M can help.

Learn how to protect your screens from visual hackers.

About Visual Hacking

The data is in. Visual hackers are out there, and 3M can help.

Learn how to protect your screens from visual hackers.

About Visual Hacking

The data is in. Visual hackers are out there, and 3M can help.

Learn how to protect your screens from visual hackers.

The Visual Hacking Experiment 1

An eye-opening look at the need for visual privacy in the workplace.

With screens capable of displaying private information virtually everywhere, visual privacy is an issue every organization must consider. To see how easy it is to capture sensitive company information through visual hacking, 3M and the Visual Privacy Advisory Council worked with a third party organization (Ponemon Institute) to conduct an experiment in which an undercover white hat hacker was sent into several participating corporate offices.

The results serve as a good reminder of the importance of addressing visual privacy in organizations.

View Video

See the results.

And learn how to help protect sensitive information from visual hackers.

See the results.

And learn how to help protect sensitive information from visual hackers.

See the results.

And learn how to help protect sensitive information from visual hackers.

  • Infographic about how often sensitive information was obtained

    Visual hacking is easy.

    An undercover white hat hacker was able to obtain sensitive information in 88% of trials.2

  • Infographic about how quickly visual hacking happens

    It happens quickly.

    In nearly half of the trials an undercover visual hacker was able to obtain high level company information in 15 minutes or less.2

  • Infographic about how multiple peices of information are at risk

    Multiple types of information are at risk.

    An undercover visual hacker saw an average of 5 pieces of sensitive information per trial, including corporate financials and confidential employee and customer information.2

  • Infographic about how visual hackers were often unnoticed

    It often goes unnoticed.

    The visual hacker was stopped in only 30% of attempts. Meaning 70% of the time no one did anything to stop them.2

  • 1 Sponsored by 3M
    2 Ponemon Institute, “3M Visual Hacking Experiment,” 2015, sponsored by 3M and the Visual Privacy Advisory Council.


Explore the Visual Hacking Experiment

Downloads and resources to learn more about the Visual Hacking Experiment.

Visual Hacking Risk Areas

Take the risk out of these key risk areas by addressing points of vulnerability in the workplace.

Understanding the methods of visual hackers can help to protect your visual privacy. Organizational leadership should focus on common points of visual hacking to help reduce vulnerability. Login credentials, classified documents, corporate financials and more are all at stake.

Take a walk through your office.

Virtually any screen you see can also be seen by a visual hacker.

Take a walk through your office.

Virtually any screen you see can also be seen by a visual hacker.

Take a walk through your office.

Virtually any screen you see can also be seen by a visual hacker.

  • Illustration of person looking at screens in an office

    Anyone can be a visual hacker.

    How many visitors and contractors walk through your office every day? Even your own employees may see sensitive information.
  • Illustration of a person looking at screens in an open office environment

    Open office designs are prime targets.

    The low walls and shared spaces in many contemporary open office environments mean more screens are visible to more people.
  • Illustration of person looking through a glass office wall

    Be aware of common areas and glass walls.

    Lunchrooms, break rooms, conference rooms, and glass office walls and doors are all open season for prying eyes.
  • Infographic about how 59 percent of employees take their jobs outside the office

    59% 3 of employees take their jobs outside the office.

    Think outside your walls. In today’s modern, mobile business environment, having a visual privacy plan is more vital than ever.

  • 3 "Technology’s Impact on Workers”, Pew Research Center, December 2014.

Explore more on Visual Hacking Risk Areas

More downloads and resources to explore about the Visual Hacking Experiment.

Preventing Visual Hacking

Encouraging awareness of visual privacy in the workplace and equipping screens with 3M Privacy Products is a great way to help reduce the risk of visual hacking.

  • Infographic showing the zone of privacy protection that 3M Privacy Products provide

    Keep visual hackers in the dark.

    3M Screen Privacy Products use advanced microlouver technology to block side views, while providing a crisp, clear view for the intended user.

  • 3M Privacy Filters and Screen Protectors

    Help protect the information on your screen, and help protect the screen itself against scratches, scuffs and glare.

    See all our privacy products

  • Privacy for Your Organization

    See how healthcare, education, finance and government organizations can help prevent breaches.

    Learn more

  • Shop Now

    Find a privacy product that fits your device screen now.

    Product Finder

Other 3M Sites:
Shop3M
Follow Us