Journal 6

Cyber technology creates opportunities for workplace deviance. Some examples include the access to mobile devices, development of software, and the growth of the internet. First, mobile devices are available to each employee, especially in the case of BYOD policies. With a portable device, there are many ways that mobile devices can function as a threat. One method is that the employee can capture sensitive data by recording a video or screenshotting an image and expose the data on social media. Another method is when the device becomes stolen because the hacker can crack the password or reset the password to gain access to the contents inside the phone. Next, a phone does not have a native firewall to block malware and viruses, so it can transmit to the rest of the devices that are connected to it either via hotspot or Bluetooth. The development of software can serve as an issue in the workforce. Sometimes, employees can download cracked software that contains malware on their work computers, which may replicate itself and bury itself on an unknown folder. This can serve as an engine to bypass the detection of the anti-virus and track the user’s footprint secretly. Also, there are tools that enable the user to become more productive, but they leave the user vulnerable to an attack. For example, the age of video conferencing has opened up another path for hackers to harass and monitor the user. The hacker can view the user using the webcam by gaining access to the permissions category and if the user is not careful, the hacker can open up further permissions like location and microphone at his/her expense. Moreover, the growth of the internet can create another issue for the workforce. The encryption protocol on webpages can be misleading as the average employee does not know the difference between HTTP and HTTPS. Even worse, the page can pose as a reputable website, but the entered information goes directly to the hacker’s device. The phishing and spam occurrences can result in losses for the money of the company and compromise the accounts’ security for the employees.

Leave a Reply

Your email address will not be published. Required fields are marked *