How to Ease the Aftermath of a Data Breach – a look at Sony

What’s that age old saying? Fool me once, shame on you – fool me twice shame on me? Well in the case of Sony, what happens when you’re fooled more than twice?

According to recent revelations, at the time of the hack it appears as though there were only 11 people in Sony’s North American information security team; 11 people working to secure a company with over 7,000 employees.

Even more disturbing, the sensitive files on the Sony Pictures network weren’t password-protected or encrypted internally. This kind of public information now poses the great question: “Did Sony even understand their IT Security landscape?” What’s more, did they have a strategy around enterprise data security? Given that back in 2007, Sony’s Director of Information Security, Jason Spaltro, was quoted in an interview saying, “…it’s a valid business decision to accept the risk [of a security breach],” it clear that no real investment was made in IT security nor was there any real understanding of the importance of protecting sensitive information.

This breach, among others, is just another classic example of organizations undermining the value of data encryption. Going back to Spaltro’s 2007 interview, he also stated that he “…will not invest $10 million to avoid a possible $1 million loss.”

Experts are estimating that this hack is going to cost Sony a cool $100 million. Previous hacks have cost the company approximately $171 million. We’re not exactly mathematicians here, but it’s safe to say that these numbers just aren’t adding up.

For those organizations out there that have yet to truly understand the value of investing in security solutions, especially those that protect and encrypt their data, take a lesson out of Sony’s book and make the time to choose the right security strategy for your company.

Previous Post
Weak Passwords
Next Post
Using a Botnet to “Crack” AES Encryption Keys?

Related Posts

620,000 reasons to encrypt

I’ve talked about it before and as an organization we’re constantly trying to tell people and organizations that encryption should be the first line of defense for data on portable devices such as laptops. And yet again, we’re seeing a…
Read more

Safeguarding Transactions

The retail industry has been in the spotlight with data breach after data breach. With the holiday season fast approaching, companies need to take extra measures to secure transactions. According to Verizon PoS invasions accounted for 31% of the 148…
data breach

The Most Costly Data Breaches of 2015

Have you lost track of the number of data breaches that have taken place in 2015? Before the year draws to an end, it’s nearly a certainty that there will be more, and that they will be high profile. (more…)
Read more

Leave a Reply

Your email address will not be published.

Fill out this field
Fill out this field
Please enter a valid email address.

Menu
Contact Us

This will close in 15 seconds