Internet Technology, Marketing, and Security:
Security Breach Faced by Sony Corporation
BUS 508: Contemporary Business
Assignment 4
Strayer University
November 25, 2011
Introduction
In the global marketplace, to attract the customers and provide relevant information to the customers, internet is used by most of firms as a promotional tool. In this, web-sites, social networking sites, etc. are used by the firms to communicate with the customers. Although, many security tools and techniques are used by the firms to secure the data of firm and customers, yet, some security breaches are also faced by the firms due to technical advancement. For this paper, Sony Corp. is selected that has faced security breach. Sony Corporation is a
…show more content…
Search engine marketing: Search engine marketing is also used by Sony Corporation to promote its products among the customers. In this, the firm increases its visibility in search engine result pages or web pages through using appropriate key words. It is conducted by the company through search engine optimization, paid inclusion, paid placement, etc. It helps the firm to attract customers through providing needed information about the products (The Sony Brand, 2010).
So, above discussed internet marketing strategies are used by Sony Corporation to attract potential customers and communicate with them effectively.
Security Policy and Response of Firm on Security Breach
To secure the data of customers and software information of the firm, Sony group privacy policy is used by Sony Corporation. In this, to win confidence and trust of the customers, appropriate use and security control tools are focused by the firm under this security policy. Management of the firm believes to give priority to the protection of personal information of the customers and limits the use of it for vague purposes. Additionally, Sony Global Information Security Policy and related rules & standards are also implemented by the firm to ensure the security of data and information at the workplace (Computer Security Division, 2009).
Principles and
Some security risks involved with conducting business online are imposters, eavesdroppers and thieves. Also, there are crackers or hackers, which are people who write programs and manipulate technologies to obtain unauthorized access to computers and networks. The elements of computer security are secrecy, integrity and necessity. Secrecy is protecting against unauthorized data disclosure. Integrity is preventing data from being modified by someone who is unauthorized and ensuring that the contents of emails aren’t changed before they get to he recipient. Necessity is preventing data delays or denials. It is important to establish a security policy to protect assets, to define acceptance and unacceptable behavior and to review physical and
Many companies have several locations that are statewide as well as international. The threat to the company’s security policy is that much greater because of the company’s expansion; this has placed the company’s information at a higher level for security breaches. The company needs to stay up-to date with the latest technology to make sure the company information can be accessed to all of their locations efficiently. Organizations that have global operations have a harder time effectively securing their information. The Internet is one of the common ways that an international company uses to conduct business; because the company can use their website to post information.
Michael’s Store, Inc. is an arts & crafts Retail chain. It has more than 1040 stores located in 49 US states & Canada. The company also owns and operates the Aaron brother’s retail chain, which happens to have an additional 115 stores across the Country. Michael’s store Inc. had a Security breach, which took place between May 8, 2013 and January 27, 2014. About 2.6 million cards or about 7 percent of payment cards used at its stores during the period were affected. Alarmingly, its subsidiary Aaron brothers also had been breached between June 26, 2013 and February 27, 2014. It was reported that Aaron brothers had 400,000 cards impacted. The duration of the treacherous attack in total was 8 months (Schwartz, 2014). In this report, security breach of Michael’s store Inc. is analyzed. The topics covered are how the breach occurred, what did the authorities do to educate the customers & how in future such attacks can be avoided.
It is almost impossible to find the top reasons why most security breaches happen on a secure network compromising hundreds to thousands of users’ personal information. This happens today more often than one would like to think and the consequences are astronomical for users, employees and customers of the companies. To protect a network and thoroughly secure confidential information, one has to examine the top vulnerabilities and think outside of the normal box to protect the network. When a security breach happens, there is usually a pretty simple reason why it has happened. This paper will discuss one of the highly publicized security breaches to happen in years, the Sony PlayStation Network & Qriocity music and video service that
The Lockheed Martin Corp is a fir that deals with aerospace and security issues and is mainly engaged in research work, designing, manufacturing, development as well as integration of advanced technology systems, services as well as products. The major portion of the clients of this corporation is the U.S. Department of defense as well as the federal government agencies. The other section of the clients is the international governments as well as the commercial sale of their products (Lockheed Martin Corporation, 2012a).
Now a day, companies are focusing and investing more on IT security, where the company’s and customers’ personal and financial information managing and storing. Certainly, more cost involves in this process. Companies who failed in security breach prevention paid and paying huge amount. Example for this is Target. This multinational grocery stores company’s data breached in 2013 this affecting its business. Furthermore, by 2015 nearly 1000 Target employees lost their jobs and the company is facing legal suits from bankers and customers.
In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.
UnitedLex recognizes that to be a successful company they need to be able to promise a secure environment for their employees and their customers. This safety applies to all technical systems and the information stored, processed, or transmitted within these assets. This document covers many different Information Systems Security Policies to provide guidance on what is authorized and prohibited use on several systems. Each ISSP will explain their purpose, intended audience and who is responsible for managing the systems.
Research Objective: The main theme of this research paper is to protect sensitive information that any organization or business possess. With community’s increasing reliance on information systems and technology there is scope for security breaches, more likely to happen. Not only monetary loss it can create damage to information assets that has sensitive data. To secure these assets from any internal or external damage organizations has to follow proposed rules and guidelines. Also security responsibilities
Sony can also differentiate themselves in the market by employing a consumer-focused positioning strategy. A consumer-focused positioning strategy revolves around consumers. This strategy can be tailor made to the audience by using social media, apps, and other online platforms to engage, access, and directly communicate with consumers (Positioning(marketing), n.d.). Being consumer focused is in line with Sony’s new planning
In the last decade it’s amazing how technology has advanced over the years and will continue to advance for many years to come. Every year there is a new cell phone from Apple or Samsung, with new features that make our lives more convenient. From faster software to higher picture quality and so on. I am unable to recall the last time I used a camera to take pictures or went to the bank to deposit a check. Technology advances every day and many can’t wait to see what’s next to come. But with new technology comes greater risk for violations of privacy. In the following research paper I will discuss the types of security breaches and the cost associated with these breaches that businesses around the world face on a daily basis.
While all of these technologies have enabled exciting changes and opportunities for businesses, they have also created a unique set of challenges for business managers. Chief among all concerns about technology is the issue of information security. It seems to be almost a weekly occurrence to see a news article about yet another breach of security and loss of sensitive data. Many people will remember high profile data breaches from companies such as T.J Maxx, Boston Market, Sports Authority, and OfficeMax. In the case of T.J. Maxx, a data breach resulted in the loss of more than 45 million credit and debit card numbers. In many of these incidents, the root cause is a lack of adequate security practices within the company. The same technologies that enable managers can also be used against them. Because of this, businesses must take appropriate steps to ensure their data remains secure and their communications remain
Ideally, marketing in general entails is creating and communicating marketing message to the clients of the organization. This process has been realized by most scholars to increase the organization’s exposure to the consumers and build a very strong relationship between the consumer and the firm (Ryan& Jones, 2009). More significantly, the modern technology has made
Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization’s reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non-financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters.
Safety of information is the most valuable asset in any organization particular those who provide financial service to others. Threats can come from a variety of sources such as human threats, natural disasters and technical threats. By identifying the potential threats to the network, security measure can be taken to combat these threats, eliminate them or reduce the likelihood and impact if they should occur.