What the Rest of Us Can Learn from the Sony Data Breach

On November 24th, 2014 a group of hackers calling themselves “The Guardians of Peace” or the “GOP” leaked large amounts of data from Sony entertainment’s internal servers. This data included sensitive and controversial emails between executive, footage of currently in production films, and top secret scripts of films that were being considered for production. All told the cost of damages as a direct result of the breach is estimated to be approximately $100 million

Sources are still uncertain about the length of time over which the hack took place, however they estimate that the perpetrators had acquired access to Sony’s Internal Infrastructure for over a year before the discovery of the infiltration in November. These are some of the most important lessons that can be learned from this massive breach.

Data Breaches Cost Way More Than Just Money

There’s a reason private information stays private. A lot of the most damning information leaked to the world had to do with the emails of Amy Pascal, Hollywood super-agent. When her complaints about celebrities such as Angelina Jolie became public, they irreversibly damaged the reputation of Sony among the most influential in the movie business.

Even worse, the leaks revealed internal dissent about the quality of the films that Sony produced, subverting the marketing efforts of the studio. Everyone from directors to actors to writers now view Sony in a lesser light, reducing the amount of talent willing to work for the company.

No One is Safe From Data Breaches

As one of the biggest, most advanced technology companies in the world, Sony should be nearly impervious to hacker attacks. The leak was so massive that it acts as a cautionary tale for any business who assumes their digital assets are safe. All companies should take this as an example of what happens when poor security provides opportunities for hackers to steal prized data.

Encrypt Everything, Destroy the Rest

Encrypting information such as email makes it extremely difficult, even in the event of a data breach, the make use of what’s stolen. Of course, destroying old data prevents this information from being leaked in the first place.

Companies don’t have to suffer through what Sony did if they make data security a top priority. Teaching your employees safe data practices is the first step; finding a good data security IT company ensures that gaps in security are closed and remain so, protecting your company from data-based catastrophe.

Previous Post
Server Security: Use Pre-Boot Network Authentication
Next Post
Mitigating the Risk of “Man In The Middle” Cloud Attacks

Related Posts

SecTor 2014 – What We Learned

Last week, thousands of IT security professionals gathered in Toronto for the annual SecTor Security Conference to share compelling research and new techniques. From malware attacks to unencrypted stolen devices, data theft is rampant in the enterprise, and security solutions…
Read more

It’s not as hard as you might think

I was reading an article from ITWorld this week that touched on the recent data breach at the South Carolina Department of Revenue. While I find this type of thing fascinating, I also find it scary when someone says something…

Data Breach Law

A new American law that would create a protocol of how a data breach is handled may be soon in play.. President Barrack Obama called for a federal legislation on Monday, January 12th that would standardize how a data breach…
Read more

Encryption only works if you use it

Once again there’s been a device theft that has left the personal health info (PHI) of 11,000 patients out in the open because the device was unencrypted. But when you look deeper into the problem, the organization did actually have…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.