{"id":527,"date":"2017-06-19T03:29:35","date_gmt":"2017-06-19T03:29:35","guid":{"rendered":"http:\/\/bknlawyers.com\/?p=527"},"modified":"2024-04-29T21:05:37","modified_gmt":"2024-04-29T21:05:37","slug":"top-ten-eight-lessons-to-be-learned-from-the-2014-sony-hack","status":"publish","type":"post","link":"https:\/\/bknlawyers.com\/?p=527","title":{"rendered":"Eight Lessons To Be Learned From The 2014 Sony Hack"},"content":{"rendered":"<p>It\u2019s approaching three years since the November 2014 hack against Sony Pictures Entertainment grabbed headlines and since then, stories of information theft, computers being held hostage by malware, data leaks and the like seem as though they are becoming more of a part of the everyday fabric of our digital life, not less. For this reason, it seems prudent to provide you with eight considerations to keep in mind for the health and welfare of your digital life, whether at home or at work. Here they are, in no particular order:<\/p>\n<p><strong>1. If You Don&#8217;t Want It Leaked, Don&#8217;t Write It<\/strong><br \/>\nYour mom was right when she said not to say anything if you have nothing nice to say. No matter what the marketing materials may say, there really is no such thing as a perfectly secure communication. Even your million-bit encrypted, billion dollar secure e-mail system is vulnerable to the Mark 1 eyeball if you forget to log out of your computer while you go to lunch. So before you put anything in writing, ask yourself what would happen if someone other than the intended recipient saw it \u2013 if the answer is \u201cnothing good,\u201d then don\u2019t write it. More than one Sony executive learned this the hard way after their questionable &#8220;private&#8221; email comments were made public.<\/p>\n<p><strong>2. Sometimes The Old Ways Are The Best<\/strong><br \/>\nAlthough I don\u2019t think vinyl sounds better (please don\u2019t throw anything at me), analog is still sometimes better than digital. If you\u2019re not sure about whether to put something in writing, that\u2019s probably a good sign you shouldn\u2019t \u2013 consider picking up the phone and making a call or, I know this may seem radical, walk down the hall and have a face-to-face conversation instead. Sure, your phone could be bugged or your conversation could be videotaped by a cell phone \u2013 see above as to no communication being perfectly secure \u2013 but in this day and age it\u2019s more likely that a security breach occurs on a digital level rather than an analog level.<\/p>\n<p><strong>3. Hoarding Is Not A Good Thing<\/strong><br \/>\nThe delete button is your friend. Sometimes there are confidential or private documents that cross our desks and, depending on where you work, this could be a very common occurrence. However, that doesn\u2019t mean that you have to keep those documents around once you\u2019re done with them \u2013 if you don\u2019t need them anymore, don\u2019t just tuck them away in a corner of your hard drive to be forgotten: get rid of them (assuming you\u2019re allowed to). One of the (many) issues revealed in the Sony hack was that Sony had employee social security numbers scattered around between hundreds of random documents. There was zero reason for this, just the regular accumulation of digital trash that people didn\u2019t bother getting rid of after they were done.<\/p>\n<p><strong>4. Hiding In Plain Sight Doesn&#8217;t Always Work<\/strong><br \/>\nJust because it\u2019s digital, doesn\u2019t mean it can\u2019t be hidden. Much like the stereotypical warning that \u201cpassword\u201d shouldn\u2019t be your password, you also shouldn\u2019t label your folder containing your unencrypted passwords as \u201cpasswords.\u201d And yes, that is exactly what at least one person at Sony did. If you have a list of passwords or something else private that you\u2019re keeping around \u201cjust in case,\u201d call it \u201cAunt Ronda\u2019s Secret Sauce Recipe\u201d or bury it in a folder filled with hundreds of expense reports. It\u2019s certainly not the best solution, but if you have to keep it at least make it a little harder to find.<\/p>\n<p><strong>5. Nothing Stays Forever<\/strong><br \/>\nJust because it\u2019s digital, doesn\u2019t mean it is permanent. One of the unique aspects of the Sony hack was that the hackers not only stole materials, but destroyed some materials as well. Backups are important and should always be maintained. And not just one backup, but a backup of that backup \u2013 preferably one that is offsite and not connected to the internet. Keeping all your backups in one place and connected to one another is, to be put it bluntly, a recipe for disaster in the event of a hack or intrusion. Also, if it\u2019s so important and critical that you can\u2019t possibly live without it, actual paper has long served the human race as a means of storing information.<\/p>\n<p><strong>6. All Or Nothing At All?<\/strong><br \/>\nIf you\u2019re running a business and thinking about imposing policies as to how your employees use your company\u2019s electronic resources (e.g. computers, internet, and social media), consider that if you are too lax these policies will be useless and if you are too strict the policies will either not be followed or make it impossible to work. The Goldilocks approach is probably best \u2013 recognize that there is nothing that can provide you 100% protection (see numbers one and two) and focus on imposing policies that reduce the significant risks, such as protecting against downloaded attachments or putting restrictions on the ability to install programs (or apps).<\/p>\n<p><strong>7. The Boy Scouts Still Have It Right<\/strong><br \/>\nFire drills are mind numbing and boring, which is exactly the point. Once you\u2019ve done the hundredth drill of your life, it\u2019s become so mundane that \u2013 hopefully \u2013 if it ever comes time to actually evacuate for a fire, your body and subconscious will know exactly what to do even if your active mind is in panic mode. Consider implementing something similar for what to do in the event of a data breach. Do you know how to lock down your computer? Who to call? Who to notify? How to continue operations afterwards? It is almost always better to anticipate than to react, so if you can put an \u201caction plan\u201d or \u201cexit strategy\u201d (or whatever other corporate buzzwords you want to combine) into place and drill yourself (or your employees) on the process, you\u2019ll be better equipped to respond in the event digital disaster strikes.<\/p>\n<p><strong>8. Always Assume You&#8217;re Next<\/strong><br \/>\nThe golden rule, summing up all the previous items of advice, is to simply operate as though you are 100% certain you are going to get hacked on any given day. We wear seat belts even when we\u2019ve never been in a serious accident because we recognize that at any given time we could be and so should be ready. The same applies to digital security \u2013 if you are diligent in living your digital life in a way where you anticipate being hacked, then it\u2019s much more likely you\u2019ll walk away with minimal harm than if you wait to figure out what to do until that desperate moment where you try to react to your digital life being thrown out into the public eye.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>If you\u2019re involved in a lawsuit or risk management and have any questions regarding current or potential legal issues, we would urge you to contact an attorney as soon as possible to obtain advice, guidance and representation. At Baker, Keener &amp; Nahra, we have the experience, skill, and drive to get the best possible results for our clients, no matter the size of the case or the scope of the problem. So if we can be of any assistance to you, please contact us and let us know how we can help.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s approaching three years since the November 2014 hack against Sony Pictures Entertainment grabbed headlines and since then, stories of information theft, computers being held hostage by malware, data leaks and the like seem as though they are becoming more of a part of the everyday fabric of our digital life, not less. For this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/bknlawyers.com\/index.php?rest_route=\/wp\/v2\/posts\/527"}],"collection":[{"href":"https:\/\/bknlawyers.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bknlawyers.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bknlawyers.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bknlawyers.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=527"}],"version-history":[{"count":6,"href":"https:\/\/bknlawyers.com\/index.php?rest_route=\/wp\/v2\/posts\/527\/revisions"}],"predecessor-version":[{"id":1330,"href":"https:\/\/bknlawyers.com\/index.php?rest_route=\/wp\/v2\/posts\/527\/revisions\/1330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bknlawyers.com\/index.php?rest_route=\/wp\/v2\/media\/1327"}],"wp:attachment":[{"href":"https:\/\/bknlawyers.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bknlawyers.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bknlawyers.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}