{"id":15,"date":"2020-09-20T21:28:27","date_gmt":"2020-09-20T21:28:27","guid":{"rendered":"https:\/\/student.wp.odu.edu\/kvers002\/?p=15"},"modified":"2020-09-20T21:28:27","modified_gmt":"2020-09-20T21:28:27","slug":"how-has-cyber-technology-created-opportunities-for-workplace-deviance","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/kvers002\/2020\/09\/20\/how-has-cyber-technology-created-opportunities-for-workplace-deviance\/","title":{"rendered":"How has cyber technology created opportunities for workplace deviance?"},"content":{"rendered":"\n<p>Workers need training to know what to do and what not to do. Humans make mistakes and some cyber risks are due to insider error. Workers also need proper motivation and incentive to perform well. They need to know why security and safety is important and be rewarded to do the right thing.<\/p>\n\n\n\n<p>Workers need to know common ways hackers access the company so they don\u2019t unwittingly help. They need to know about tailgating and Spam phishing emails. Insider threats should be minimized to actual acts of malice.<\/p>\n\n\n\n<p>Some workplace deviance is workers acting out of accord with employee and worker agreements and business policies. It is important to communicate acceptable use of workplace resources and time to employees. It\u2019s very easy to pick up computer viruses visiting inappropriate websites on workplace computers or downloading software. Employees shouldn\u2019t generally have administrator access to download software on workplace computers. Tech makes it easier for employees to access time wasters like social media. Social media can even contribute to data leakage. Employees can unwittingly spread company secrets or customer information such as pii.<\/p>\n\n\n\n<p>Some cyber crimes are committed by malcontent employees and former employees who misuse workplace resources or credentials. It\u2019s very easy once you\u2019re past the security guard and you have an account with appropriate permissions to access a company\u2019s valuable resources such as hardware, easily stolen laptops and smart phones. Deliberate data theft or sabotage is also a danger. Scorned employees can steal data to sell to rival companies or the dark web.<\/p>\n\n\n\n<p>Employees have easier access to airgapped networks than hackers. It\u2019s essential that all employees are vetted. People should have background checks run on them that include debt. It\u2019s important to know who is vulnerable to bribery and might be more easily convinced to steal or sabotage.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Workers need training to know what to do and what not to do. Humans make mistakes and some cyber risks are due to insider error. Workers also need proper motivation and incentive to perform well. They need to know why&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/kvers002\/2020\/09\/20\/how-has-cyber-technology-created-opportunities-for-workplace-deviance\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":18299,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/kvers002\/wp-json\/wp\/v2\/posts\/15"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/kvers002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/kvers002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kvers002\/wp-json\/wp\/v2\/users\/18299"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kvers002\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/kvers002\/wp-json\/wp\/v2\/posts\/15\/revisions"}],"predecessor-version":[{"id":16,"href":"https:\/\/student.wp.odu.edu\/kvers002\/wp-json\/wp\/v2\/posts\/15\/revisions\/16"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/kvers002\/wp-json\/wp\/v2\/media?parent=15"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kvers002\/wp-json\/wp\/v2\/categories?post=15"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kvers002\/wp-json\/wp\/v2\/tags?post=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}