Workplace deviance generally encompasses anything that employees do that doesn’t align with the company’s goals or potentially damages the company. This usually includes actions such as theft and vandalism, as well as retaliating against other employees or treating employees harshly. Computers and other information technology have opened up even more opportunities for workplace deviance. One common form of deviance is employees accessing websites not important for business purposes such as social media sites and other sites meant for personal entertainment. This vastly affects company productivity since these sites are generally meant for long sessions of scrolling or watching content. In order to prevent this, businesses should block these distracting and potentially malicious entertainment sites and monitor what sites employees are visiting in order to protect employees and ensure work is getting done. Another form of workplace deviance is information theft. Employees often have access to sensitive information since it may be necessary depending on their role. Deviant employees may choose to sell this information to make a quick profit or leak it after getting fired as a form of retaliation. This is why it is important to make information accessible only on a need to know basis and ensure that all sensitive information is encrypted using the latest encryption standards. Vandalism and destruction of company property can also be done using workstations. For example, a disgruntled employee can bring in a flash drive and upload a virus to the company network. Security professionals are already trying to prevent external threats, so a virus that starts already inside the network is even more of a headache. Adequate security against flash drives and other devices that plug into computers should be enforced. Users should also be blocked from running certain programs and scripts since they can damage the computer and leave vulnerabilities for other hackers. In conclusion, Workplace deviance is often an overlooked threat and can be prevented by controlling employee access to sites or information and monitoring employee usage of workstations and other equipment.