Journal #6

on

Cyber technology has worked its way into nearly all aspects of our daily lives, personal and professional. Through its various uses it has become an innovative way to socialize, search for and store information, but for some it has become a means to victimize other people and organizations for monetary gains and more. In the workplace, many workers require a certain level of access to critically sensitive information in order to do their jobs effectively. These employees are trained in how to properly handle such information and how to safeguard it. However, there are outliers who see this as an opportunity to engage in their own selfish motives and desires. This is known as workplace deviance and technology has made it easier than ever for employees to engage in this behavior.

 With the appropriate level of access or the right opportunity, employees can engage in different forms of cyber theft. Since most corporations rely on some sort of digital platform to store sensitive information, cyber criminals have the ability to steal records pertaining to finances, health information, personal identifiable information, among other types of information. They can do this through various means such as hacking, phishing, and malware to name a few. Cyber criminals can also acquire this information and then sell it to other organizations for monetary gain or personal gain. These types of threats are especially dangerous for organizations that manage critical infrastructure. This is why it is important for organizations to identify and control access to their information, ensuring that only the appropriate individuals with the appropriate clearances and need-to-know have the required level of access. Conducting background checks is another crucial element to safeguarding information. Companies should know who they’re hiring and giving access to their information. Lastly, companies should also have policies/procedures in place regarding information security, and ensure employees are properly trained on them.

Leave a Reply

Your email address will not be published. Required fields are marked *