DATA DOCTORS

Lessons you and your business can learn from the Sony hack

Dec 24, 2014, 7:24 PM | Updated: Apr 24, 2015, 8:13 pm

Q: One of the things I keep hearing about because of the Sony hack is encryption, but how exactly do I get it setup for my business?

There isn’t enough space in this column to cover all the lessons that can be learned from what continues to come out of the Sony Pictures massive hacking event.

The use of encryption is a big one because it can provide an excellent level of security even if cyber thieves make off with thousands of sensitive files via a compromised computer.

Anytime everyone has access to everything on a business network without any real security, hackers need only compromise one user to wreak havoc for everyone (the likely scenario in the Sony hack).

Encryption acts as another security barrier that will generally cause the hackers to move on because of the time that it will take to break the encryption.

Encryption technology is built into most operating systems. Windows has BitLocker for workstations and servers while Mac OS X has FileVault or you can use encryption programs from many third-party companies.

But before you make any decisions to start encrypting your data, you really should review all of the options, pros, cons, security and backup measures to make sure you don’t inadvertently lock yourself out of your own data. Encryption strategy needs to be thought through, so make sure you consult your IT support group before you get started.

Another simple step that Sony could have taken to protect data was to create individual passwords for sensitive data files. Just about every type of business program you use has an option to password protect the individual files. Sony had 140 clearly labeled, but unprotected, password files that contained thousands of private passwords, a hugely embarrassing technical faux pas!

First off, saving a file that has the word “password” anywhere in the name is pretty much a magnet for hackers, but storing the information in plain text with no encryption or even a file password is crazy. Remember, hackers are very good students of human behavior, so scanning all files for the word password is generally one of the first things they’ll do after a break in.

E-mail has become such a liability from a security standpoint because it’s the intrusion method of choice whenever a company is being targeted. Clever emails can get even the most tech-savvy users to fall for tricks — imagine getting a message that appears to be from your CEO announcing that the company is being acquired.

If the message included a document that “explained the acquisition process” and how it would “affect your job,” you’d probably open it without hesitation.

To help employees easily sniff out fake internal e-mail messages, I’ve been encouraging businesses to consider alternative channels such as private Intranets, instant messaging or private social networks as the primary trusted resource for internal communications.

Data Doctors

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can ma...

Data Doctors

Here are all the tips we know regarding how to spot deep fake videos

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can make detection a bit more difficult.

5 days ago

Patrick Mahomes #15 and head coach Andy Reid of the Kansas City Chiefs are recorded on a phone as t...

Data Doctors

Handy tech tips all Valley residents should use to find lost phones in a snap

Q: My phone went missing, and I haven’t been able to locate it using the Find My service, so what should I do next?

12 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are tips for freeing up Google storage space

Google provides a generous amount of free online storage but it can fill up quickly depending on how many of its resources you use.

19 days ago

Discover how to assess, estimate, and shop for the right battery pack with this concise guide. (Pex...

Data Doctors

Here is everything you need to know for testing and buying battery banks

Discover how to assess, estimate and shop for the right battery pack with this concise guide.

26 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are the truly free smartphone video editing apps

The processing power on our smartphones has grown exponentially, allowing anyone to perform sophisticated video editing easily.

1 month ago

Google Maps app....

Data Doctors

How to rediscover places visited years ago on Google maps

Whether you're an Android or iOS user, or prefer accessing Google Maps on your computer, you'll find step-by-step instructions to unlock your travel memories effortlessly.

1 month ago

Sponsored Articles

...

Midwestern University

Midwestern University Clinics: transforming health care in the valley

Midwestern University, long a fixture of comprehensive health care education in the West Valley, is also a recognized leader in community health care.

...

DISC Desert Institute for Spine Care

Sciatica pain is treatable but surgery may be required

Sciatica pain is one of the most common ailments a person can face, and if not taken seriously, it could become one of the most harmful.

...

Collins Comfort Masters

Here’s 1 way to ensure your family is drinking safe water

Water is maybe one of the most important resources in our lives, and especially if you have kids, you want them to have access to safe water.

Lessons you and your business can learn from the Sony hack