Skip to Primary Navigation Skip to Site Navigation Skip to Main Content All 3M.com Site Map

3M Privacy & Protection White Papers

  • The Three Biggest Risks Of Cloud Computing
    Posted On 31/03/14

    While cloud computing has been around for a few years, widespread corporate use is growing at an incredible rate. According to Forrester Research, spending on cloud computing services amounted to $40.7 billion in 2011.

  • Secure Visual Data Security
    Posted On 31/03/14

    While awareness of the threat posed by a data breach is increasing, there is still a lack of understanding of the many ways in which such a breach can occur and, little awareness of the often simple steps that can be taken. 

    Learn More
  • Visual Data Breach Risk Assessment Study
    Posted On 31/03/14

    The protection of sensitive information as it is displayed on screen — is an emerging issue in information security and an under-addressed area of risk in corporate security policies. 

    Learn More
  • Visual Privacy Maturity Model
    Posted On 31/03/14

    During a survey of 800 working professional, 70% of respondents revealed that their organizations had no explicit security policy on working outside of the office. When combined with the fact that 67% of respondents had worked with some type of sensitive data outside.

    Learn More
  • Visual Privacy Readiness Checklist
    Posted On 31/03/14

    Educational modules on visual privacy included in security awareness training.
    Visual privacy awareness education included in new employee orientation.

    Learn More
  • Privacy Productivity Study
    Posted On 31/03/14

    In 2010, the Visual Data Breach Risk Assessment Study revealed that two out of three working professionals are displaying sensitive information on their mobile devices, such as social security numbers, credit card numbers and other non-regulated information.

    Learn More
  • Mobile Technology in Healthcare
    Posted On 31/03/14

    While this trend is exciting for the future of the healthcare industry, it could also have potential consequences for the confidential information to which doctors are privy. Current mobile technology users present expanded risks to the security.

    Learn More
  • Financial Services - The Need For Visual Privacy
    Posted On 31/03/14

    In the financial services industry, the protection of customer data and internal financial statements is non‐negotiable. With rising customer security sensitivity, motivated attackers, and an increasingly complex legal and regulatory environment.

    Learn More
  • Dealing With Careless Mobile Workers
    Posted On 31/03/14

    Mobile workers have been in our midst for years. In the past, working from home involved a personal computer that was located in one room with a modem or ISDN connection at best. The changes to the model are incredible.

    Learn More
  • How Supporting Privacy Practices Can Help the Bottom Line
    Posted On 31/03/14

    Internet-based security breaches have become commonplace and are at an all-time high. According to the Open Security Foundation, there were 1,387 data loss incidents in 2012 compared to 1,084 in 2011.

    Learn More
  • Mitigating Risk - Privacy In Practice
    Posted On 31/03/14

    The defence of data as it is displayed on a screen. Visual Privacy has become increasingly important given that mobile workers often access data in highly exposed areas such as coffee shops, trains, and airplanes.

    Learn More
  • What New Mobile Technology Means For Your Company’s Data Security Policy
    Posted On 31/03/14

    Gartner predicts that by 2013, 80 percent of businesses will support a workforce using tablets, bringing both ease and utility – but more importantly, risk.

    Learn More
  • A Risk Based Approach To Defending Visual Privacy
    Posted On 31/03/14

    Defending an enterprise from a data breach (both malicious and accidental) requires a combination of technical, policy, physical and people controls. With the rise in worker mobility, organizations have been forced to re–‐examine their data security strategy.

    Learn More
Find A Privacy Filter Or Screen Protector For Your Device
Find Out More
Why Choose 3M To Protect Your On Screen Data?
Find Out More
3M™ Privacy Filters Can Help You Comply With Data Security Legislation & Guidelines
Find Out More
Do You Have A Privacy Or Protection Product Query or Question?
alt
Get In Touch!