{"id":303,"date":"2024-04-22T22:56:26","date_gmt":"2024-04-22T22:56:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/emcgowan23\/?p=303"},"modified":"2024-04-22T23:19:03","modified_gmt":"2024-04-22T23:19:03","slug":"how-has-cyber-technology-created-opportunities-for-workplace-deviance","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/emcgowan23\/2024\/04\/22\/how-has-cyber-technology-created-opportunities-for-workplace-deviance\/","title":{"rendered":"How has cyber technology created opportunities for workplace deviance?"},"content":{"rendered":"\n<p>I believe cyber technology has made it harder and yet easier for workplace deviance. It&#8217;s a bit harder to know who the criminal is behind the computer. Not saying the perpetrator doesn&#8217;t eventually get caught up, but it can take a while to discover the identity of the criminal.&nbsp;<\/p>\n\n\n\n<p><strong>You are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?<\/strong><\/p>\n\n\n\n<p>As a CISO I would ensure that my company&#8217;s networks are protected by setting up firewalls and encrypting confidential and internal information. My employees would also be trained on the security principles as well as compliance. I&#8217;m sure that&#8217;s all within the same &#8220;ring&#8221; though. We&#8217;d use the top notch cloud software so that we have a place for our data to be regularly backed up into. I&#8217;d let it be known that only certain employees with certain permissions would be allowed to view certain types of information. As a CISO I&#8217;d be able to see and overlook any and everything that goes in and out the company, while maybe a lower level employee could only view information or data dealing with their account. Software and other programs would also be needed to keep prevent viruses from &#8220;infecting&#8221; the computers or anything else where important data is stored.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I believe cyber technology has made it harder and yet easier for workplace deviance. It&#8217;s a bit harder to know who the criminal is behind the computer. Not saying the perpetrator doesn&#8217;t eventually get caught up, but it can take a while to discover the identity of the criminal.&nbsp; You are the CISO for a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/emcgowan23\/2024\/04\/22\/how-has-cyber-technology-created-opportunities-for-workplace-deviance\/\">Read More<\/a><\/div>\n","protected":false},"author":28673,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/emcgowan23\/wp-json\/wp\/v2\/posts\/303"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/emcgowan23\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/emcgowan23\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/emcgowan23\/wp-json\/wp\/v2\/users\/28673"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/emcgowan23\/wp-json\/wp\/v2\/comments?post=303"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/emcgowan23\/wp-json\/wp\/v2\/posts\/303\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/sites.wp.odu.edu\/emcgowan23\/wp-json\/wp\/v2\/posts\/303\/revisions\/306"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/emcgowan23\/wp-json\/wp\/v2\/media?parent=303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/emcgowan23\/wp-json\/wp\/v2\/categories?post=303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/emcgowan23\/wp-json\/wp\/v2\/tags?post=303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}