Article

Ernie Diaz
Ernie Diaz 13 January 2015

Hackproof: How Not To Be Sony

There is a lesson to be learned about protecting your privacy online from the recent Sony hacking scandal.

Before the holidays, the world was shocked when the large multinational Sony Entertainment was hacked. How could such a large company like Sony be hacked and furthermore, is it impossible to prevent an elite team of hackers if they want to get into a company’s systems?

 

The chances that hackers got into Sony through a back door left open by accident, or by some disgruntled employee, is much, much greater than the odds that they employed some truly technically difficult programming to get in.

 

But why is that? Because that’s how virtually all the hacking cases I’ve ever come across happen. Follow the conversation below to understand how you can take steps to safeguard your company’s online privacy.

How can a large company like Sony get hacked?

These are the kind of organizations that can easily spend a million dollars on a corporate retreat for their executives, but won’t hire a vetted net security specialist for $200k a year.

Doesn’t best practice tech security involve expensive hardware?

In most cases, no. In terms of Sony, and almost any other organization that wants to prevent hackers, it’s a matter of systems, not hardware.

What kind of systems?

Systems that are relatively easy to set up, but require diligence to maintain.

Give us a checklist of systems.

OK, the first system would be a password policy. The second would establish and track who has access to what in a company’s files.

That’s it?

Believe it or not, yes. This would prevent 95% of would-be hackers. The crazy thing is, I know of only a few companies that do this well, or let’s say systematically - only companies with high level security at all phases of their operations, such as defense contractors.

How do we prevent the other 5%?

Setting up your servers correctly. Segmenting the server so that sensitive files are partitioned correctly is pretty straightforward. But you want to pay someone good to do it, to set up these systems.

And few companies do?

Amazingly, no. Maybe they will now, in the wake of this Sony debacle. But usually the decision-maker doesn’t have enough awareness of tech security and what it’s worth to justify the extra investment. The server will essentially be one big file.

And even the ones who segment their servers correctly don’t follow the security policy diligently. An employee gets fired, and no one bothers to cancel his password. That kind of thing. That’s where the security breach usually comes from.

What about foreign companies in China – do they need more stringent systems?

I guess if the Chinese government wants to get your data, and it’s stored in a Chinese data center, they can.

So a company in China concerned about security should have its own data center. Is that expensive?

It depends on how much data you have. Essentially, it means having your own servers. But having worked with a lot of Chinese companies, as well as foreign companies in China, I’d say implementing the systems we talked about before will make a company as secure as it needs to be.

What if I’m a foreign company in China working on proprietary software? What are my chances that some well-funded Chinese hackers are targeting me?

Very slim. If you’re a defense contractor working on an engine system for a new bomber, that kind of scenario, then you’d best be taking every possible measure, but as I mentioned, those kinds of companies already are.

Otherwise, there’s too much potential downside in getting caught, compared to the upside of getting some code before its finished, as opposed to the normal method of reverse-engineering once a product is out (laughs).

OK, last question. I’m a well-funded tech company in China that wants to take every security precaution. I’ve had an expert segment my servers and establish a security policy that I’m implementing, and all my data is on in-house servers. What is the last mile for complete protection?

Hire programmers who regularly attempt to hack your files. This will expose any existing holes in your systems. It’s best practice for companies with high stakes in tech security, since it’s a constantly evolving field.

The key concept is building anti-fragile systems, for security and otherwise. I recommend anyone interested to read the book ‘Antifragile’ for better understanding.

 

Read More on Digital Doughnut

Please login or register to add a comment.

Contribute Now!

Loving our articles? Do you have an insightful post that you want to shout about? Well, you've come to the right place! We are always looking for fresh Doughnuts to be a part of our community.

Popular Articles

See all
Set Your Data Free With Web3

Set Your Data Free With Web3

In the first of our series of pieces looking at the top digital trends of 2023, lead web developer, Craig Wheatley, discusses what the current state of owning our own data is and how Web3 is revolutionising how it can...

Candyspace Media
Candyspace Media 1 February 2023
Read more
7 Reasons Why Social Media Marketing is Important For Your Business

7 Reasons Why Social Media Marketing is Important For Your Business

In the past two decades social media has become a crucial tool for marketers, enabling businesses to connect with potential customers. If your business has yet to embrace social media and you want to know why it is...

Sharron Nelson
Sharron Nelson 29 February 2024
Read more
How to Review a Website — A Guide for Beginners

How to Review a Website — A Guide for Beginners

A company website is crucial for any business's digital marketing strategy. To keep up with the changing trends and customer buying behaviors, it's important to review and make necessary changes regularly...

Digital Doughnut Contributor
Digital Doughnut Contributor 25 March 2024
Read more
The Impact of New Technology on Marketing

The Impact of New Technology on Marketing

Technology has impacted every part of our lives. From household chores to business disciplines and etiquette, there's a gadget or app for it. Marketing has changed dramatically over the years, but what is the...

Alex Lysak
Alex Lysak 3 April 2024
Read more
Five Ways to Gain Maximum Return on Your Videos

Five Ways to Gain Maximum Return on Your Videos

Without question, our collective appetite for video is fuelling more video-centric experiences online. Video’s ability to impart both emotional and practical information makes it a win-win for brands and consumers...

Juli Greenwood
Juli Greenwood 2 July 2024
Read more