a story of a cyberhest continues…

Karun, Mike and Veronica all shifted in their chairs. Karun spoke.

“Marie, we know you liked Mr. Burrough and that this must be difficult. But our investigation was very fair.”

Marie nodded. “Of course. And if Mr. Burrough is guilty, he should be let go from the company and whatever is the proper punishment should be leveled against him. But I think there may be more to this.”

Karun nodded. “Go on.”

“William was pinpointed as the guilty party in this case based on the fact that his login credentials were used. The record shows that the theft occurred during work hours, at 1:17 PM.”

“What I found strange about that,” she said, “was that Mr. Burrough has worked on my team for several years. His operation runs like a clock. He is always in slightly early, and he almost always leaves at the same time in the afternoon.”

“And he always takes lunch at the same time—between 1:00 and 2:00.”

Karun and Veronica glanced at one another before looking back at Marie.

She continued.

“One other thing that stands out to me about Mr. Burrough is that he is rather naive.” She smiled a bit, then returned her face to the business position. “We once convinced him that I was a French diplomat early in my career.”

“The more I thought about it, the more it began to make sense to me that Mr. Burrough was a good target for a cyber heist.”

Karun nodded, moving his head up and down in a much larger range than he had before. “What you say makes sense so far. But do you have a competing theory as to what happened?”

Marie felt a slight sense of relief that she had made progress, but knew she—and William— were not yet out of the woods. “I believe someone stole Mr. Burrough’s login credentials via phishing attack. It’s something that happens all the time.”

“And it may have happened to us.”

 

self governance reporting IT security

Marie Pierre believes she has cleared her employee’s name. But what if she’s wrong? And how will she prove her case to the company?


Stay tuned for our next email, the stunning conclusion of Cyberheist.


Or

· See the solution that could have pinpointed the employee’s involvement here.
· Email Blue Lance to find out more.
· Or call us at 800-856-2583

 

All characters and other entities appearing in this work are fictitious. Any resemblance to real persons, dead or alive, or other real-life entities, past or present, is purely coincidental.

Did you miss the beginning of a Story of a Cyber Heist?  Read Here.

Chapter 8, Will Self Governance Save the Day in a Cyber Heist?