{"id":15,"date":"2021-02-26T02:17:55","date_gmt":"2021-02-26T02:17:55","guid":{"rendered":"https:\/\/student.wp.odu.edu\/ndito001\/?p=15"},"modified":"2021-02-26T02:17:55","modified_gmt":"2021-02-26T02:17:55","slug":"eportfolio-6","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/ndito001\/2021\/02\/26\/eportfolio-6\/","title":{"rendered":"ePortfolio #6"},"content":{"rendered":"\n<p>Before there was computer deviance we only had physical crime. Everyone knows the basic physical crimes (rape, murder, assault, theft, trespassing, etc.), but now with the introduction of the computer and the internet criminals have found new ways to operate. <br>Believe it or not, your employee is your biggest threat to your information security. Poorly trained employees can lead to hackers entering your system. &#8220;How?&#8221; you may ask. Well, there isn&#8217;t just one answer. Usually it&#8217;s through their email inbox. Hackers will send seemingly innocent emails disguised as a bank or the power company and implant some pretty nasty stuff. <br>This is interesting and all but it still doesn&#8217;t answer the question on why there are so many cybercrimes in the workplace. The answer is dependency. Almost everything is stored digitally. When was the last time you went to the doctor and they had physical files for the doctor? Almost never. There is so much sensitive information stored digitally that cyber criminals have to step their game up. Whether they use a trojan horse to release ransomware or they phish an employee to clink on a not so safe link. Cyber criminals are exploiting our dependency on digital storage.<br>These cyber criminals can also be in your own office. For example, the average employee shouldn&#8217;t have access to payroll. If they have access to this money distribution system, they can easily exploit it. At this point in time, the company is at the mercy of one employee. Another example is if an employee who is trusted with sensitive data gives out said data for a reward. Whether it&#8217;s $10,000 or a new car or a trip to Tahiti. There are many ways new technology has lead to more crime whether inside the company or outside the company.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Before there was computer deviance we only had physical crime. Everyone knows the basic physical crimes (rape, murder, assault, theft, trespassing, etc.), but now with the introduction of the computer and the internet criminals have found new ways to operate. Believe it or not, your employee is your biggest threat to your information security. Poorly&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/student.wp.odu.edu\/ndito001\/2021\/02\/26\/eportfolio-6\/\">Read More<\/a><\/div>\n","protected":false},"author":19926,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/ndito001\/wp-json\/wp\/v2\/posts\/15"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/ndito001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/ndito001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ndito001\/wp-json\/wp\/v2\/users\/19926"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ndito001\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":2,"href":"https:\/\/student.wp.odu.edu\/ndito001\/wp-json\/wp\/v2\/posts\/15\/revisions"}],"predecessor-version":[{"id":19,"href":"https:\/\/student.wp.odu.edu\/ndito001\/wp-json\/wp\/v2\/posts\/15\/revisions\/19"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/ndito001\/wp-json\/wp\/v2\/media?parent=15"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ndito001\/wp-json\/wp\/v2\/categories?post=15"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ndito001\/wp-json\/wp\/v2\/tags?post=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}