linkedin logo
schedule a pickup request data destruction quote
west coast computer recycler R2 RIOs Certified west coast computer recycler reliable data security west coast computer recycler secure ewaste recycling west coast computer recycler certifications

What the Sony Hack Can Teach Us about Cyber Security

You’ve probably heard the news – a mysterious hacker group calling itself Guardians of Peace hacked into Sony Pictures Entertainment’s computer systems earlier this month. While some of the information they leaked was minor – personal email conversations – other information was quite serious such as the personal information of their employees from salaries to social security numbers. In this day and age, it may be hard to believe that a company such as Sony could be hacked, but the reality is that any company can potentially be hacked. Secure data protection in Los Angeles is just as important as it is smaller cities. Regardless of size, there are still things that you can do to help protect yourself and your company.


First it’s important to recognize that hackers can be understood along two axes: focus and skill. An attack against Sony Pictures for example was high focused and high skilled since it was geared directly towards Sony. In these cases, when there is a direct target, the hacker will almost always get in. More often than not though, companies are hacked by low focus but high skilled hackers. This means that the hackers don’t particularly care who they hack, just as long as they hack somebody. Recently, this is what happened to Target and Home Depot. The hackers simply wanted credit card information; they were not trying to harm those companies specifically. In this case, there are some things that you can do to protect yourself. For example, if Home Depot had been better protected, the hackers would have simply moved on to another, easier hit. When it comes to security, you need three things: protection, detection, and response. Surprisingly, Sony was not heavily protected nor did it have a good detection plan. Work with your IT to figure out the best security for your company. If you go the extra mile, you could potentially help save valuable information from being leaked.

ohsas 18001:2007 logo
iso 14001 2004 logo
r2 responsible recycling 2013 logo
west coast computer recycler bonded and insured