In-depth

How can big companies fight hackers?

As Sony finds itself on the receiving end of a hacking campaign, just what problems are big companies facing in this area and what can they do about it? Simon Brew takes a look.

Even factoring in some of the substantive challenges Sony has faced over the years, it's not wide of the mark to suggest the past few weeks have been amongst the most taxing.

The headline-grabber has been the hacking of the PlayStation Network service (which is only just coming back online, after a month away) and the associated potential theft of tens of millions of user details, along with credit card information.

Given much of Sony's strategy going forward involves people trusting them with their personal details, this is a substantive hammer blow and one that's going to take some coming back from.

Yet there has been far more to what Sony's been facing than that as, from the turn of the year, it's been up against something of a guerrilla battle with a team of hackers, going simply under the moniker of Anonymous.

Advertisement
Advertisement - Article continues below

This is a substantive hammer blow and one that's going to take some coming back from

The Anonymous group had taken umbrage with Sony's legal action against George Hotz, the hacker who managed to after a period of several years break the copy protection on the Sony PlayStation 3 console. Until a recent out-of-court settlement was agreed, the plan seemed to be to drag Hotz through the legal system.

This approach had unexpected ramifications for Sony, however, when Anonymous began targeting some of the firm's non-PlayStation related websites. They did so with some success, attacking several Sony sites, although always firmly denying it was anything to do with the PlayStation Network hacking incident.

That hasn't stopped people finger-pointing though, arguing that by the very structure of the Anonymous group, it's entirely feasible some of its members had something to do with it. Perhaps we'll never know for certain, which adds to the trouble Sony faces.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/business-strategy/mergers-and-acquisitions/354191/xerox-threatens-hostile-takeover-after-hp-rebuffs
mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019
Visit/security/bugs/354180/google-to-offer-15m-to-anyone-that-can-break-a-pixel-4
bugs

Google to offer $1.5m to anyone that can break a Pixel 4

22 Nov 2019
Visit/public-cloud/34850/salesforce-takes-aws-relationship-to-the-next-level
News

Salesforce takes AWS relationship to the next level

19 Nov 2019