{"id":23,"date":"2023-02-19T20:24:56","date_gmt":"2023-02-19T20:24:56","guid":{"rendered":"https:\/\/student.wp.odu.edu\/agarc038\/?p=23"},"modified":"2023-02-19T20:24:56","modified_gmt":"2023-02-19T20:24:56","slug":"e-portfolio-entry-6","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/agarc038\/2023\/02\/19\/e-portfolio-entry-6\/","title":{"rendered":"E-portfolio entry #6"},"content":{"rendered":"\n<p>Cybersecurity technology has created opportunities for workplace deviance in many ways like allowing employees to bring their device and connect it to a network, giving access to sensitive data, and enabling employees to have credentials to access their systems and networks. An employee&#8217;s device could be compromised while they are on a public network and since it has access to a company\u2019s system, intranet, or network a hacker could send malware via their employee\u2019s device when they log into their company\u2019s network, this would be an example of unintended workplace deviance. An employee could also attack a business\u2019s network through their device and hold the data for ransom. In fact, according to an article published by Edward Segal on Forbes, \u201cA new study shows that 48% of employees at surveyed organizations have been approached directly for help in planning ransomware attacks against their companies. The number is even higher \u2014 55%\u2014 for directors.\u201d An attack aided by employees could devastate a company\u2019s IT infrastructure and reputation. The login credentials of a worker at a company could be stolen through a phishing attack and then used by a hacker to gain remote access to a corporation\u2019s intranet or network. As reported by, \u201crecent research from IRONSCALES, 81% of organizations around the world have experienced an increase in email phishing attacks since March 2020.\u201d This leaves businesses that are unaware of phishing attacks vulnerable to having their systems, networks, and data stolen or destroyed by hackers. This is why personnel have to be trained against phishing attacks and not give their login credentials to anyone outside or inside the company. Data has been made more accessible by technology; however, with that accessibility comes a myriad of ways to be hacked. All of these opportunities for workplace deviance are created by the advancements in cybersecurity technology. <br><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity technology has created opportunities for workplace deviance in many ways like allowing employees to bring their device and connect it to a network, giving access to sensitive data, and enabling employees to have credentials to access their systems and&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/agarc038\/2023\/02\/19\/e-portfolio-entry-6\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25789,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/agarc038\/wp-json\/wp\/v2\/posts\/23"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/agarc038\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/agarc038\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/agarc038\/wp-json\/wp\/v2\/users\/25789"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/agarc038\/wp-json\/wp\/v2\/comments?post=23"}],"version-history":[{"count":2,"href":"https:\/\/student.wp.odu.edu\/agarc038\/wp-json\/wp\/v2\/posts\/23\/revisions"}],"predecessor-version":[{"id":26,"href":"https:\/\/student.wp.odu.edu\/agarc038\/wp-json\/wp\/v2\/posts\/23\/revisions\/26"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/agarc038\/wp-json\/wp\/v2\/media?parent=23"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/agarc038\/wp-json\/wp\/v2\/categories?post=23"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/agarc038\/wp-json\/wp\/v2\/tags?post=23"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}