The chances of another company suffering a Sony-style hack in the future are not as remote as the security heads of those companies would like to think.
As I’m sure you will remember, Sony were hacked last year (reputedly related to the then-upcoming release of The Interview) resulting in the destruction of 3,000 computers and the publication of “sensitive and proprietary information” – including Social Security numbers – of more than 47,000 celebrities, freelancers, and current and former Sony employees. n the Internet.
Jon Miller, vice president of strategy at Cylance, an antivirus software maker, talks to Steve Croft from CBS’ 60 Minutes (in an interview to be aired on Sunday) saying,
“There are probably a couple thousand, three, four, five thousand people that could do [the Sony] attack today, not all of them are in friendly countries and the number is growing rapidly.”
As the general public also found out from the reports following the Sony hack, in order to continue to do business, staff members were re-issued with legacy BlackBerry devices they liberated from storage.
With a staggering 90% of companies vulnerable to a similar cyberattack given current security levels, it’s just a matter of time before another multinational has its employees’ details, along with other sensitive information, leaked.
In the meantime, there is a security measure that companies can put into place simply and quickly – BlackBerry security.
BlackBerry Enterprise Server 12 (more commonly known as BES12) was designed with Security in mind from the start – along with the ability to secure not just BlackBerry devices, but also iOS and Android devices, too. Teamed with products such as BBM Meetings and BBM Protected, BES12 ensures that all of the sensitive information a companys’ employees have access to is always kept secure (both on device and when uploading or downloading data).
The after-the-fact solution for Sony’s hack was to go #BackToBlack… If you owned a company (of any size), wouldn’t you want to be prepared against a security breach rather than worrying about how much damage has just been done to your and your co-workers’ livelihoods, after you’ve been hacked?