Star 0

Abstract

Data security threats are growing more sophisticated. However, a hacker really only needs one piece of valuable information to unlock a large-scale data breach, which can be achieved by taking a snapshot of log-in credentials on a screen and other low-tech means. This presentation illustrates the ease of obtaining data this way and how privacy and security personnel can combat low-tech threats.