Your data is your most valuable commodity, and you’ve taken all the necessary steps to protect it with encryption and firewall security. Recently, however, breaches in information security due to “visual hacking” are on the rise. Perpetrators can take photos of computer screens, or simply look over employees’ shoulders. What are the best practices for addressing this issue?