The Problem With Sony What To Do When The Hackers Come

PAGES
2
WORDS
652
Cite
Related Topics:

¶ … hacking of Sony's network information systems last year that led to the pulling of a big-budget comedy from theaters and the resignation of head Amy Pascal remains a current problem for businesses and not just Sony. As The Wall Street Journal reports, this incident shines a light on the protection that businesses need against hackers -- but it also highlights the need for management to communicate with more self-awareness, always considering that someone somewhere might be listening. Words do come back to haunt us, as Amy Pascal has learned the hard way. Fritz (2015) of the Journal reports that "Ms. Pascal was outraged and upset at the way her emails were picked apart by the media and even found herself chased by paparazzi amid the controversy over whether Sony would release the Seth Rogen comedy "The Interview," which the hackers -- said to be connected to North Korea -- wanted to keep out of theaters." The hot button issue here is two-fold: first, cyber security; second, management not using derogatory terms or slurs in private communications. The lesson here is that systems need to be tighter. Every business should be guarded against cyber attacks. The symptom -- the political fallout of exposure -- is not the real cause. The real cause is a lack of security...

...

Pascal acted without discretion when she used negative language in her correspondence. This was not the type of discretion that executives should show in leadership positions and when the public found out as a result of the hack, the root problem was revealed: poor leadership at Sony. The advantage to this problem is that it exposed a weakness in the system; the disadvantage of course was that it cost persons their jobs and their security.
Fritz, B. (2015). Amy Pascal Steps Down as Head of Sony's Film Business. The Wall

Street Journal. Retrieved from http://www.wsj.com/articles/amy-pascal-steps-down-as-head-of-sony-pictures-film-business-1423157351

Discussion Topic 2: (1 Page)

How secure are businesses and organizations from cyber attacks? Groups like Anonymous are now well-known for striking out at organizations that pose a threat to public safety. Fox News recently reported that Anonymous hacked into the Cincinnati Police Department's database and published a list of police addresses following a shooting that took the life of a black man in the city.

The problem here is two-fold: first, there is a lack of security infrastructure in businesses and organizations when it comes to…

Sources Used in Documents:

The strengths and interests I have gained in the study of management/leadership during my journey are that I now understand the importance of a strong leadership theory and the value of organizational culture as well as the importance of security. I'd like to research these topics, therefore, in a case study like the one described.

Fox News. (2016). Hacker group releases information about Cincinnati Police

Department employees. Fox News. Retrieved from http://www.foxnews.com/us/2016/02/22/hacker-group-releases-information-about-cincinnati-police-department-employees.html


Cite this Document:

"The Problem With Sony What To Do When The Hackers Come" (2016, February 26) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/the-problem-with-sony-what-to-do-when-the-2159257

"The Problem With Sony What To Do When The Hackers Come" 26 February 2016. Web.19 April. 2024. <
https://www.paperdue.com/essay/the-problem-with-sony-what-to-do-when-the-2159257>

"The Problem With Sony What To Do When The Hackers Come", 26 February 2016, Accessed.19 April. 2024,
https://www.paperdue.com/essay/the-problem-with-sony-what-to-do-when-the-2159257

Related Documents

Kutagari's fervor did not impede him from researching potential of market for his idea -- another mark of the succesful entrepeneur. His persistence, belief in his work, tenacity, and originality led to the hugely popular Playstation that launched in December 1994 (Edge Staff, 2009). Kutagari, in other words, epitomized all that innovation requires. Firstly he chose an article that possessed the four qualities of 'opportunity': (2) Opportunity is attractive -- Playstation is

Sony Security Breaches It is a summary of the most important elements of your paper. All numbers in the abstract, except those beginning a sentence, should be typed as digits rather than words. To count the number of words in this paragraph, select the paragraph, and on the Tools menu click Word Count. Sony Corporation has had a series of very public security breaches in the past few years. Despite a long

Network Security Management From the onset, it is important to note that for data to flow from one computer to another, such computers should be interconnected in what is referred to as a network. With such interconnectedness comes the risk of data interception and it is for this reason that network security is considered crucial. In the recent past, the number of corporations that have experienced attacks on their computing resources

Cracking the Code The contemporary issue of physical security/IT security Modern day businesses and organizations face the contemporary issue of physical security/IT security. Whether a business needs to maintain network security for a website or server, or an organization needs to restrict access to a server room, there are several aspects facing the problem of dealing with IT security. Any general computer networking instructor teaches the DOD and/or OSI networking models and

Pros and Cons of Vmware
PAGES 22 WORDS 6852

Vmware Pros and Cons of VM Ware Over the last several years, the marketplace for servers and virtual machines has become an avenue many technology firms are focusing on. This is because these large devices are used to store tremendous amounts of data for cloud computing. One of the biggest companies is VMware. Founded in 1988, they have transformed how various products and services are delivered to cliental utilizing their computers,

Psychological Factors Motivating Hackers Recent advances in IT (Information Technology) has revolutionized the business model where different organizations have launched online businesses to achieve global competitive market advantages. Despite the benefits that businesses derive from the new business model, hackers have taken the advantages of changes in the business landscape to penetrate into the database of different organizations and steal sensitive information. Many companies have lost an enormous amount of