123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Sony Faces Cyber-attack

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Popular websites and networks are favorite targets of cybercriminals. Attackers not only gain instant publicity, but also extract privileged customer and business information. The extracted information could Sony is still investigating the attack, which forced the company to take Sony PlayStation Network (PSN) and Qriocity services offline last week. The services are used by over 75 million people worldwide. While PlayStation provides online gaming, Qriocity offers audio and video services for Sony devices. Security professionals of the company are investigating the attack. The company had initially referred to the attacks as an external intrusion attempt.

Information security professionals of the company are revamping the network infrastructure to strengthen defenses against intrusion attempts. The company has not disclosed whether any user related data has been compromised. The information may include personal information such as name, age, contact details and financial information such as credit card numbers. Information security is crucial for continued trust of customers. Last month's data breach at Epsilon has ...
... affected millions of customers worldwide. Customers, whose e-mail addresses were exposed, are receiving several phishing e-mails. IT professionals may update themselves on latest threats and data protection mechanisms by participating in webinars, training programs and undertaking online university degree courses.

Anonymous group was in the news for launching distributed denial-of-service attacks on Sony's servers earlier this month. The group has denied responsibility for the new set of attacks. Threats to network security may be active or passive. Both internal and external factors may pose threat to network security. Cyber-attacks result in disruption of regular services and adversely affect the business of the company. Hiring experienced IT professionals qualified in masters of security science, penetration testing and network security administration may help in understanding the network security environment, identification of threat vectors and security tools required to remediate the flaws.

Attackers may also target specific individuals of the company through social engineering attacks to compromise their computer systems, and gain access to other computers in the network. Therefore, organizations must create awareness among employees on social engineering threats such as spear phishing, impersonation as peers, fake online accounts on social media sites through huddle sessions and e-learning programs. Employees could be encouraged to undertake online degree courses on cyber security to inculcate safe computing practices.

Network security must be evaluated at regular intervals to identify and mitigate weaknesses. Network administrators must also keep track of security advisories to identify and apply necessary patches.

Total Views: 270Word Count: 407See All articles From Author

Add Comment

Computers Articles

1. What Identity Governance Really Means In Modern Enterprises
Author: Mansoor Alam

2. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates

3. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma

4. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions

5. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights

6. Power Bi Tutorial For Beginners: Learn Business Intelligence Step By Step
Author: Tech Point

7. Spark Matrix™: Data Governance Solutions
Author: Umangp

8. How Prediction Market Software Development Is Transforming Data-driven Decision Making
Author: david

9. Naming Development & Management
Author: brainbell10

10. Mysql Database Development & Management Services
Author: brainbell10

11. Mongodb Development & Management
Author: brainbell10

12. Spark Matrix™: Conversational Automation
Author: Umangp

13. How Care Home Software Helps Improve Daily Operations In Care Homes
Author: Centrim Life UK

14. Pc & Tech Stores: Latest Trends In Hardware And Accessories
Author: Jack Williams

15. The Infozed Blueprint: Powering The Modern Workspace
Author: suma

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: