How to Make Sure Your Company Isn't the Next Sony
What if your company is hit with a cyberattack like Sony's? One expert has tips for how employees can practice better security.
Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Daily (Mon-Sun)
Tom's Guide Daily
Sign up to get the latest updates on all of your favorite content! From cutting-edge tech news and the hottest streaming buzz to unbeatable deals on the best products and in-depth reviews, we’ve got you covered.
Weekly on Thursday
Tom's AI Guide
Be AI savvy with your weekly newsletter summing up all the biggest AI news you need to know. Plus, analysis from our AI editor and tips on how to use the latest AI tools!
Weekly on Friday
Tom's iGuide
Unlock the vast world of Apple news straight to your inbox. With coverage on everything from exciting product launches to essential software updates, this is your go-to source for the latest updates on all the best Apple content.
Weekly on Monday
Tom's Streaming Guide
Our weekly newsletter is expertly crafted to immerse you in the world of streaming. Stay updated on the latest releases and our top recommendations across your favorite streaming platforms.
Join the club
Get full access to premium articles, exclusive features and a growing list of member rewards.
Holiday cheer is in short supply for employees of Sony Pictures Entertainment. The November cyberattack itself was bad enough, but the salt in Sony Pictures' wounds is the revelation that its company-wide security practices were embarrassingly bad.
Sony Pictures is far from the only company that needs to improve its security chops. Even if your company isn't making a movie about Americans trying to assassinate Kim Jong-Un, you'll still want to check out these tips from security expert Troy Hunt on what to do if your company gets hit with a cyberattack.
MORE: North Korea Hacked Sony? Don't Believe It, Experts Say
"How many people think the practices we're all ridiculing Sony for are exceptional and not just the norm in large [corporations]?" Hunt asked in a post on his blog.
For example, how many employees use weak or default passwords to secure their work information? Whether it's signing into your email, connecting to the office Wi-Fi network or even managing your company's Twitter account, a good password can do a lot to stand between attackers and important corporate information.
How does your company store and manage those passwords? The troves of corporate files the hackers posted online revealed that Sony Pictures had stored hundreds of thousands of passwords in unencrypted Word documents and Excel spreadsheets.
"Go and ask your marketing folks or your corporate affairs folks or whoever manages these accounts -- 'where do you store your passwords?' -- and see what sort of response you get," Hunt wrote. "In all likelihood, it won’t be pretty."
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
Then there's company email. Hunt advises employees to assume that anything sent over company email networks (or any email networks, really), might someday come to light. If you must make rude, risque or racist comments (now do you really?) don't make them on company email, as some Sony executives are now learning the hard way.
"As with sensitive data of other kinds, you can apply a really simple rule to email: You cannot lose what you do not have," Hunt wrote. "Show some restraint, and that's one problem you won't be dealing with."
On the software-development side, Hunt also pointed out that many companies test in-development software using real company information, sometimes even including company records.
"Here's the sobering reality about all this: Getting anyone to care is hard," Hunt said.
That's especially true before a disaster strikes, when the threat of cyberattack doesn't seem real. But some small changes on an individual basis can still help improve your own security, as well as that of your whole company.
- 12 Computer-Security Mistakes You're Probably Making
- 13 Security and Privacy Tips for the Truly Paranoid
- Your Router's Security Stinks: Here's How to Fix It
Jill Scharr is a staff writer for Tom's Guide, where she regularly covers security, 3D printing and video games. You can follow Jill on Twitter @JillScharr and on Google+. Follow us @tomsguide, on Facebook and on Google+.
Jill Scharr is a creative writer and narrative designer in the videogame industry. She's currently Project Lead Writer at the games studio Harebrained Schemes, and has also worked at Bungie. Prior to that she worked as a Staff Writer for Tom's Guide, covering video games, online security, 3D printing and tech innovation among many subjects.
-
kep55 How to avoid being another Sony. Simple. Get the hell off the internet and go back to private interconnects. Remember, a web is a bunch of holes held together with fragile strings.Reply
