Any company that does not communicate their network policies and procedures are subject to having at least one uneducated employee who has no understanding of safeguarding information. This opens a door for things like email spoofing and phishing. Without the proper education employees may access an email of someone pretending to be someone within the company or a client and attempt to click a link inside of the email that prompts them for pertinent information. If that information is entered it could give someone unauthorized access to a system.
As the climb in technology makes not only our personal lives, but businesses more efficient and easier it is easy to develop a comfort zone for technology. However, no one should be comfortable, especially not businesses because cyber technology created opportunities for workplace deviance. Employees within a company may have access to several client’s confidential data and are trusted to safeguard it on a daily basis. There are some employees that do safeguard data and some that do not. While some employees intentionally abuse the company’s policies, not all do it on purpose.
On the other hand, there are white-collar cybercrimes. They come to work daily as well and appear to be no threat or harm to the company. White collars pose an insider threat and usually are not meant to hurt anyone but used for financial or personal gain. They have access to data and misuse their access for malicious reasons. These types of crimes are usually provoked by desire and greed. For example, an incident that may occur is an employee may use their rights to steal financial information from a well-known client. Other white-collar crimes include inside trading, credit card fraud, identity theft, and copyright infringement. The motives can be as simple as employees just not getting paid enough or a disgruntled employee.
To help prevent any of these issues from occurring companies need to have policies and procedures in place that clearly state the consequences of violating polices. In addition, a company could verify that employee’s only have access to folders that pertain to their role. Also Conducting periodic company audits, and background checks may also limit the unnecessary cyber abuse.