Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Shoulder Surfing: What is it and how to Stop it
    Cyber Security Awareness Month Tip

    Shoulder Surfing: What is it and how to Stop it

    By Sofia CoraOctober 24, 20232 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Shoulder surfing is a social engineering technique used by malicious persons who want to see your sensitive credentials in real life. As by the name, shoulder surfing is someone who is peering over your shoulder, either literally or from a distance, and taking notes of sensitive information such as PIN codes or passwords that you have entered. Here are some techniques to protect yourself from those peering over your shoulder for your sensitive information.

    Staying Safe

    • Install a Privacy Screen on your devices. A privacy screen is a useful tool for not allowing anyone to see what you are viewing on your screen. It blocks light from certain angles so that the only way you are able to view your screen is directly head-on and not from the sides. This is a great deterrent in accessing sensitive information if you are in public.
    • Locking your device when you step away from it. It’s always best practice to lock your devices when you are not actively using them. Leaving your device unattended, even momentarily, can allow for malicious actors to access and manipulate your information and device.
    • Shield yourself from prying eyes. Physically blocking strangers from viewing your sensitive information is critical when entering bank PINs and passwords in public. If you need to access information on a mobile device in public, have your back against a physical wall or corner to prevent prying eyes.
    • Do not access public WIFI. If you must access sensitive information in public do not use public WIFI to do so as your information is vulnerable. Use your data or a personal mobile hotspot to access the information. If it is urgent and you have to use public WIFI then you should use a VPN to access the information.
    • Don’t say passwords out loud. Saying credentials or other sensitive info over the phone can be dangerous as well, for those who may not be near but can hear you. Additionally, most reputable organizations will not have you say your password over the phone to verify your identity.

    Even with all these tips in mind, users should still be mindful of opening sensitive or personally identifiable information in public, to evade prying eyes.

    Source:

     https://www.experian.com/blogs/ask-experian/what-is-shoulder-surfing/https://nordvpn.com/blog/shoulder-surfing/

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Cybersecurity Awareness Month Tip Data Privacy Mobile social engineering
    Previous ArticleHow to Make Secure Passwords
    Next Article What Can We Learn From The Dragos Cybersecurity Breach?

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d