Today most companies and organizations data are stored completely online. To safeguard critical data and information, companies will employ cyber security and IT officials to ensure the safe keeping of the organization’s digital assets. These assets can range from financial/legal information, trade secrets, customer data, to basic data that is crucial to the vitality of day-to-day operations. In many cases if these sets of data were to be leaked/held for ransom, effects could cause the business to never recover. These selected cyber security employees are tasked with protecting the institutions data, there are some who choose to use their given access privileges for self-interest, and in some cases to sabotage the company. A common example in the workplace would be a disgruntled employee or even ex-employee could download sensitive information and hold for ransom or sell it to a competing company/interested individual for profit. Another example includes an ex-employee whose authorization was not restricted could keep coming back to cause problems in the software. These are examples of workplace deviance because it is not what the company expects of you. An unsatisfied employee could shut down the organizations security systems leaving the organization open to cyber-attacks. This could leave the company at risk of hackers infiltrating the system and stealing crucial information from the company. Some may even seek to sabotage the digital presence of the company, attainable by ridding of systems in use daily, requiring specific configuration. Another thought for consideration is that these cyber systems with the right authentication can be accessed from anywhere with computer access. In turn, enabling the employee to do more damage without being caught. Workplace deviance can and will occur in all types of work but with cyber technology the job is a whole lot easier.