123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Sony Faces Cyber-attack

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Popular websites and networks are favorite targets of cybercriminals. Attackers not only gain instant publicity, but also extract privileged customer and business information. The extracted information could Sony is still investigating the attack, which forced the company to take Sony PlayStation Network (PSN) and Qriocity services offline last week. The services are used by over 75 million people worldwide. While PlayStation provides online gaming, Qriocity offers audio and video services for Sony devices. Security professionals of the company are investigating the attack. The company had initially referred to the attacks as an external intrusion attempt.

Information security professionals of the company are revamping the network infrastructure to strengthen defenses against intrusion attempts. The company has not disclosed whether any user related data has been compromised. The information may include personal information such as name, age, contact details and financial information such as credit card numbers. Information security is crucial for continued trust of customers. Last month's data breach at Epsilon has ...
... affected millions of customers worldwide. Customers, whose e-mail addresses were exposed, are receiving several phishing e-mails. IT professionals may update themselves on latest threats and data protection mechanisms by participating in webinars, training programs and undertaking online university degree courses.

Anonymous group was in the news for launching distributed denial-of-service attacks on Sony's servers earlier this month. The group has denied responsibility for the new set of attacks. Threats to network security may be active or passive. Both internal and external factors may pose threat to network security. Cyber-attacks result in disruption of regular services and adversely affect the business of the company. Hiring experienced IT professionals qualified in masters of security science, penetration testing and network security administration may help in understanding the network security environment, identification of threat vectors and security tools required to remediate the flaws.

Attackers may also target specific individuals of the company through social engineering attacks to compromise their computer systems, and gain access to other computers in the network. Therefore, organizations must create awareness among employees on social engineering threats such as spear phishing, impersonation as peers, fake online accounts on social media sites through huddle sessions and e-learning programs. Employees could be encouraged to undertake online degree courses on cyber security to inculcate safe computing practices.

Network security must be evaluated at regular intervals to identify and mitigate weaknesses. Network administrators must also keep track of security advisories to identify and apply necessary patches.

Total Views: 299Word Count: 407See All articles From Author

Add Comment

Computers Articles

1. How To Build A Peer-to-peer Marketplace?
Author: brainbell10

2. How To Build An Api? A Developer’s Guide To Api Platform
Author: brainbell10

3. Everything You Need To Know About Web Development In 2026
Author: chetna

4. Create A Strong Online Presence Today
Author: FutureGenApps

5. User Experience Design
Author: brainbell10

6. Dynamics 365 Hubspot Integration Guide
Author: brainbell10

7. The Thrilling World Of Geometry Dash Lite
Author: Hattie

8. Why Treating All Access, The Same Increases Security Risk
Author: Soham Biswas

9. The Audit Myth In Identity Governance: What Regulators Actually Expect
Author: Soham Biswas

10. Choosing The Right Web Design Company In Westlake For Long-term Success
Author: Compu 360 LLC

11. Unreal Game Development
Author: brainbell10

12. Market Forecast: Conversational Ai For Intelligent Contact Center
Author: Umangp

13. Complete Guide To Ipv4 Leasing, Lease Ipv4 Address & Ipv4 Address Rental By Elite Server Management
Author: Elite Server Management

14. B2b Marketer’s Guide To Onboarding A Lead Agency Without Losing Months
Author: demandify

15. Why Choose Sataware?
Author: brainbell10

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: