a story of a cyberheist continues…

When Karun entered the IT floor, he found not only Veronica, but her entire staff waiting for him in the floor conference room.

cyber error cyberheist digital managed assets


“Hello Karun,” said Veronica. “We have been hard at work to see what happened to the Parker account and wanted to let you know what we have found.”

“Tina Parker called our staff 28 days ago at 8:15 in the morning to report a missing sum of $983,741.82. William Burrough asked her our standard series of introductory questions regarding her account before handing the issue over to our security experts in customer service.”

“As usual, we ran a check to make sure she hadn’t opened herself up to theft. It turns out Ms. Parker is a very private person. She never uses her debit card, but instead prefers to use cash. The only time she engages in electronic transfer of funds is through William.”

“And it seems that, when we went back and checked the records, Mr. Burrough was the only person whose login credentials had been used to access the account.”

Karun’s eyes widened, but only slightly. “Does that mean what I would assume it to mean?”

Veronica nodded sadly. “The only conclusion we could come to was that Mr. Burrough was liable for the heist.”

Karun rubbed his eyes.

“Very well. Let’s contact HR and get in touch with his manager first thing in the morning and let her know what happened. We will let Mr. Burrough know first thing Friday morning.”

“What will happen to him?” asked Veronica.

“Your  investigation has indicated he is guilty,” said Karun. “He has to be suspended.”

Have doubt to William’s guilt? Perhaps you should. Employees just like William are wrongfully accused of cyber heist everyday.

Next email, we’ll go beyond the investigation to see where most companies make mistakes. Stay tuned to see the next step for William and to learn how you can protect your own customers and employees.

Or if you’re ready to see how can protect employees and track cyber security issues:

  • See the solution that could have stopped it here.
  • Email Blue Lance to find out more.
  • Or call us at 800-856-2583
All characters and other entities appearing in this work are fictitious. Any resemblance to real persons, dead or alive, or other real-life entities, past or present, is purely coincidental.
Did you miss the beginning of a Story of a Cyber Heist?  Read Here.
Enhanced by Zemanta