Sony Pictures Recovering from Computer Attack

Sony Pictures Recovering from Computer Attack

A Nov. 24 computer breach left Sony Pictures Entertainment employees using pens, paper and fax machines to handle their work. Some computer systems crucial to business operations are online, while employee email access was expected back earlier this week, according to a report.

“Sony Pictures continues to work through issues related to what was clearly a cyberattacks last week,” the studio said in a statement. “The company has restored a number of important services to ensure ongoing business continuity and is working closely with law enforcement officials to investigate the matter.”

An attack by a group who calls themselves Guardians of Peace resulting in the pirating of DVD copies of at least five new and upcoming movies. The films include “Fury,” “Annie,” “Still Alice,” “Mr. Turner” and “To Write Love on Her Arms.”

“This is an epic fail on the part of Sony,” said Stu Sjouwerman, chief executive of the cybersecurity training company KnowBe4. “They haven’t stepped to a level of protection they should have.”

Sony has enlisted Mandiant, a cyberforensics unit of the security firm FireEye, to assist in the search of the hackers.

About the Author

Matt Holden is an Associate Content Editor for 1105 Media, Inc. He received his MFA and BA in journalism from Ball State University in Muncie, Indiana. He currently writes and edits for Occupational Health & Safety magazine, and Security Today.

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • BriefCam v6.0

    BriefCam v6.0

    BriefCam has released BriefCam v6.0, which introduces the new deployment option of a multi-site architecture. This enables businesses with multiple, distributed locations to view aggregate data from all remote sites to uncover trends across locations, optimize operations and boost real-time alerting and response – all while continuing to reap the benefits of BriefCam's powerful analytics platform for making video searchable, actionable and quantifiable. 3

  • Videoloft Cloud Video Surveillance VSaaS Solution

    Videoloft Cloud Video Surveillance VSaaS Solution

    Videoloft focuses on transforming traditional professional surveillance systems into cloud connected solutions via the Videoloft Cloud Adapter. 3

  • Tyco Kantech EntraPass security management software

    Tyco Kantech EntraPass security management software

    Johnson Controls, the global leader in smart, healthy and sustainable buildings, and architect of the Open Blue digital connected platforms, has released the newest version of the Tyco Kantech EntraPass security management software. 3