Journal Entry #6

With the introduction of Cybertechnology there has also been an introduction to workplace crimes via cyberspace. Employees can now resort to stealing the information from their fellow employees or even the customers who are paying for their services.

If an employer does not properly restrict access to their systems by establishing access controls, then they are leaving their systems open to internal cyber risks. That is to say an employee could use the company’s data system to steal a customer’s personal information. Once the employee has the personal information they can commit fraud with it until they are actually caught. However, if the company does not have any proper security in place, then they may never realize that one of their own employees stole confidential information from their database.

With the use of cyber technology there is a chance that the employee may use his own access to steal information about his/her company and sell it to others. The sold information could be used as blackmail in order to gain money by ransoming the stolen information or the personal information could simply be leaked online. An employee no longer has to rely on pencil and paper means to record information, which means with the right technology they could record, extract, and steal confidential information from a company all while having the potential to be anonymous during the entire process.

There is also an increased chance for an employee to target their coworkers with the use of cyber technology. That could mean for employees in an office environment, an employee could hack into the computer of a coworker who sits next to them and steal any information stored on that computer. It could be confidential information about the company, a customer, or even the employee who uses the affected computer. This would also introduce the issue of how would any of the employees know if their work computers have been maliciously attacked? And even if they knew it accessed by an unauthorized user, would they know who did it. The use of cyber technology adds a certain amount of anonymity that makes it more difficult to discover who is committing cyber crimes as they occur.

Leave a Reply

Your email address will not be published. Required fields are marked *