Sony defends response time to hacker breach

SHARE:




NEW YORK (Reuters) - Sony Corp's CEO was unapologetic about the company's delay in informing the more than 100 million customers of its PlayStation Network whose account information was stolen by hackers last month.
In a stark departure from the remorseful tone struck just two weeks ago, when senior executives including heir apparent Kazuo Hirai bowed in apology in Tokyo, Sony Chief Executive Howard Stringer fired back at critics who say the company was too slow to notify consumers once the attack was known.
"This was an unprecedented situation," Stringer told reporters on Tuesday, speaking publicly for the first time since the April breach.
"Most of these breaches go unreported by companies. Forty-three percent (of companies) notify victims within a month. We reported in a week. You're telling me my week wasn't fast enough?"
The attack, considered the biggest in Internet history, prompted the Japanese electronics giant to shut down its PlayStation Network and other services for close to a month.
Critics slammed the company for waiting up to a week before telling its customers of the attack and the possible theft of credit card information, prompting lawmakers and state attorneys general to launch investigations.
Two members of the U.S. House of Representatives sent a letter to Sony on Tuesday, urging it to respond to questions about its security strategy and reveal more details about the data breach.
In the letter, Representatives Mary Bono Mack of California and G.K. Butterfield of North Carolina said they had contacted Sony on April 29 but all of their questions had not been answered by the company. The lawmakers asked Sony to respond to questions by May 25.
Sony said it expected to face monetary charges from the break-in but was still assessing the damage.
"There's a charge for the system being down ... a charge for identity theft insurance," Stringer said. "The charges mount up, but they don't add up to a number we can quantify just yet."
One expert estimated that costs from the break-in could reach as high as $2 billion.
Addressing a report that said hackers had used Amazon.com's servers to launch the attack on Sony, Sony executives said it saw no evidence this was the case.
Sony began restoring parts of the network last weekend in the United States and expects a full recovery in all countries by the end of May.
HIRAI POSITION SECURE
The handling of the crisis, the worst Sony has faced in years, has been a big test of Hirai, who has led the recovery operations as president and group chief executive of Sony Computer Entertainment.
Stringer reiterated his support for Hirai.
"I think his leadership has been very helpful and very demonstrative and I'm endorsing him," Stringer said.
Although Stringer has been in daily contact with Hirai, he thought it best to have Hirai take the lead. "This is his environment, his people, his intimate relationships with PlayStation subscribers and they like him."
What has bothered some of its customers and made Sony a big target in the hacking world is its practice of clamping down on customers who meddle with its systems.
Sony sued a famed hacker, George Hotz, this year for copyright infringement and circumventing PlayStation 3's protection schemes. Hotz, who is well known for "jailbreaking," or unlocking Apple Inc's iPhone, said on his blog he was not involved in the break-in.
The company settled the charges against Hotz on April 11. About a week later, Sony's systems were hacked.
Mark Harding, a Maxim Group analyst, said Sony could have employed less severe methods to protect itself from copyright infringement. "There were probably better ways Sony could have done it without being heavy handed," he said.
Stringer said the attack was likely related to its suit against Hotz but defended Sony's actions.
"An act was done that was dangerous to Sony, dangerous to PlayStation and we thought it was a criminal act and we had to protect ourselves."

COMMENTS

Name

4G,1,A/B Testing,2,Aerospace Engineering,2,AFP Consortium,1,Agile,2,AI,5,amazon,4,Amazon india coupons,3,AMD,1,Analytics,2,android,28,android phones,2,Anonymous,3,Antivirus,1,app,24,App Development,6,apple,32,apps,5,Artificial Intelligence,8,Assurance,1,asus,1,Audi,2,auto,7,automation,2,automation software,11,automotive technology,11,banking,1,Big data,2,bitcoin,3,BlackBerry,5,blockchain,4,blogging,1,BMW,1,branding,1,brands,2,browser,2,Business,18,Business Analytics,2,Business Intelligence,1,Business lesson,18,Business models,6,business strategy,24,Business Strategy Model,16,Business Success Story,7,business techniques,24,cameraphone,5,car,15,car technology,11,CES,1,chromebook,3,Cloud computing,6,cloud Technology,5,CMS,1,coding,1,companies,3,Consortium,1,consulting,1,content marketing,9,corporate,1,coupons,3,CRM,2,CRM Software,3,cryptocurrency,2,Customer experience,8,Customer Service,7,customer support,4,cyber crime,5,cyber security,27,data,3,data recovery,1,deals,1,Dell Streak,1,development,9,devices,2,DevOps,1,digital currency,1,digital marketing,23,Digital Transformation,2,disk,1,e commerce,1,eBay,1,ebook,1,ecommerce,8,Electric Cars,11,electronics sale,2,elon musk,2,email,1,energy,1,enterprise,11,Enterprise Security,2,enterprise technology,9,entrepreneur,3,entrepreneurship,7,ERP,2,facebook,24,file conversion,1,financial tech,1,fintech,1,firefox,2,firefox os,2,Flipkart,2,Front-end Development,3,future business,10,future technology,34,gadget,33,gamail,1,games,6,Games.,1,google,20,google cars,1,google glass,3,Google I/O,1,Google+,8,goole ranking,1,Graphics Card,1,Green energy,1,hackers,18,hacking,14,hardware,5,Healthcare,1,HealthTech,1,Home Automation,1,Hosting,3,How To Guides,22,How Tos,17,icloud,3,IDE,1,Infographic,2,Information Technology,19,infosec,14,innovation,52,internet,8,Internet Explorer,1,Internet of Things,8,Inventory Management,1,ios,18,IoT,10,ipad,8,iPhone,14,iPhone 8,1,IT certification,1,IT Operation,1,IT Service,2,IT services management,3,ITSM,2,iWatch,1,Jabong,1,JavaScript,4,JS,1,Kubernetes,1,laptop,3,LinkedIn,2,local business,1,Lotus Notes,3,MacBook,3,mackbook air,2,Magento,1,Managed IT Services,3,Mark Zuckerberg,4,Mercedes,1,messenger,1,microsoft,6,mobile app development,28,mobile apps,30,mobile broadband,1,mobile enterprise,15,mobile recharge,2,mobility,18,mobility management,11,Motorola Xoom,1,Myntra,1,network,4,nokia,1,NSA,2,Nvidia,1,Objective-C,1,Omnichannel,1,OnePlus Smartphones,1,online course,1,online education,2,online recharge,1,online shopping,4,open source,1,opreating system,5,Outlook,2,P2P,1,page ranking,1,patent,1,Payment,1,PayTM,1,pc software,1,photoshop,1,playstation,1,Porsche,1,process management,4,Procure,1,programming,4,programming language,5,Python,1,Quality,2,Redbus,1,remote control,1,renewable energy,3,review,10,SAAS,4,sales,2,Sales Funnel,2,samsung,7,scrum,1,search engine,4,Search Engine Optimization,2,security,15,Self Driving Cars,11,SEO,9,smartphone,14,SmartTech,1,SME,1,sms,1,Snapdeal,2,social media,12,social network,11,software,14,Software as a service (SaaS),5,software development,17,software methodology,8,Software Outsourcing,2,software review,4,Solar,1,Solar energy,1,Solar power,1,startup,10,steve jobs,3,storage,1,strategy,1,Supercars,1,sustainability,1,Swift,1,tablet,9,team management,3,tech,4,tech conference,1,Tech event,2,Ted talk,1,Tesla,2,Tesla Motors,3,The Internet Of Things,2,timeline,1,toolbar,1,tools,2,torrent,1,touchscreen,2,trdx,1,tutorial,2,twitter,3,udacity,1,udemy,1,ultrabook,1,USB,1,video,2,video editor,2,virtual phone,1,Virtual Reality,4,Volvo,2,VPN,3,VR,2,Wearable gadget,2,Wearable Tech,2,Web 4.0,3,Web Development,9,web technology,12,Wi-Fi,1,wikileaks,2,windows,7,windows 10,1,Windows 8,8,Windows 8 Preview,1,Wordpress,3,workplace,2,X Mountain Lion,2,xcode,1,xp,1,
ltr
item
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos: Sony defends response time to hacker breach
Sony defends response time to hacker breach
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQBsxWHuo8QOCJ45pKU2Icrm9Q7bh1ip1iCUvkv_9WD0vTZqzOs61hDcI91zmLddDGEYqkHYsLFsFpUtKU9DPloIyFBE-35WGecmRAG4ZL26iU3QVCJAwjqcvM88qOJd3lVPBunE6tAgk/s1600/PSNetwork.png
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQBsxWHuo8QOCJ45pKU2Icrm9Q7bh1ip1iCUvkv_9WD0vTZqzOs61hDcI91zmLddDGEYqkHYsLFsFpUtKU9DPloIyFBE-35WGecmRAG4ZL26iU3QVCJAwjqcvM88qOJd3lVPBunE6tAgk/s72-c/PSNetwork.png
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos
https://www.techfond.in/2011/05/sony-defends-response-time-to-hacker.html
https://www.techfond.in/
https://www.techfond.in/
https://www.techfond.in/2011/05/sony-defends-response-time-to-hacker.html
true
6925568668654321940
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy