How can big companies fight hackers?

As Sony finds itself on the receiving end of a hacking campaign, just what problems are big companies facing in this area and what can they do about it? Simon Brew takes a look.

There are still courses of action, but inevitably they are very limited.

Perhaps the best thing to do, as has been demonstrated more recently by the actions of Anonymous, is to do very little, or nothing at all.

Once the heady spotlight of publicity was shone on Anonymous, it itself began to implode. Splinters within the group appeared and details of the members were posted online. One of the group's leaders subsequently quit. This is, granted, an extreme end result, but then Anonymous is arguably a high profile and extreme case.

The lesson Sony has ultimately learned though is if you have a security problem, then it pays to be transparent about the issue itself. It had a golden chance here to prove to the world it was on top of its security by quickly and swiftly prioritising a problem, whilst alerting people as fast as possible. Sony may have been priorisiting behind the scenes, but its customer base didn't know that.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Anonymous is arguably a high profile and extreme case

Conversely, it pays not to shout and scream, no matter how much of an example you want to set, when you're taking action against a party.

The rules are clearly weighted very unevenly here, as what plays out in a court of law looks very different in the court of public opinion. The frightening thing for organisations of certain sizes is that, if a hacker really does want to find a way in, chances are they'll find a way in. And it's questionable just how much can be done about it...

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Most Popular

Visit/business-strategy/public-sector/354608/uk-gov-launches-ps300000-sen-edtech-initiative
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/network-internet/web-browser/354614/microsoft-developer-declares-its-time-to-ditch-ie-for-edge
web browser

Microsoft developer declares it's time to ditch IE for Edge

23 Jan 2020