Over the weekend Sony began a phased restoration by region of PlayStation Network and Qriocity Services, but the company’s work is not done just yet.
Following cyber attack on its data center in San Diego, California, Sony shut down the PlayStation Network and Qriocity services on April 20, to conduct an investigation and make enhancements to its security. Since then, the company has been working with several outside security firms, and says it has implemented new and additional security measures that strengthen safeguards against unauthorized activity.
Sony says it has made considerable enhancements to its data security, including updating and adding advanced security technologies, additional software monitoring and penetration and vulnerability testing, and increased levels of encryption and additional firewalls. The company also said it also added a variety of other measures to the network infrastructure including an early-warning system for unusual activity patterns that could signal an attempt to compromise the network.
“Today’s cyber crime attacks are proving to be more covert, more targeted and better organized than those we’ve seen in years past. In working with Sony on the move of their data-center, it’s clear they’re implementing measures to reduce security risks moving forward,” said Francis deSouza, Senior Vice President, Enterprise Security Group, Symantec.
But the company seems to have much more work to do in other areas. According to a report from Reuters, Sony’s Internet security has many gaps that go beyond the recent PlayStation Network breach. Security researcher John Bumgarner identified several security gaps across Sony Internet properties including the discovery of an access point to a server running an identity management system that he said controls access to logins and passwords for employees at Sony Pictures Entertainment. Bumgarner also told Reuters that he found names and partial addresses of sweepstakes contestants from an online gift registry and sweepstakes program. Bumgarner also told Reuters that on May 4th he located a server on Sony’s network that revealed names, Facebook IDs and IP addresses of Sony customers that had played games via Facebook. “Sony still has several external security issues that need to be addressed,” Bumgarner told Reuters. Despite identifying potential security gaps, Bumgarner didn’t see any evidence of breaches beyond the recent incident.
Sony is making some additions and changes to its information technology management teams, appointing Fumiaki Sakai, president of Sony Global Solutions Inc. (SGS), as acting Chief Information Security Officer of SNEI while the company conducts a search for a permanent CISO for SNEI. As CISO, Mr. Sakai is reporting to Tim Schaaff, president, SNEI, as well as to Shinji Hasejima, CIO at Sony Corporation.

More from SecurityWeek News
- Threat Hunting Summit Virtual Event NOW LIVE
- Video: ESG – CISO’s Guide to an Emerging Risk Cornerstone
- Threat Modeling Firm IriusRisk Raises $29 Million
- SentinelOne Announces $100 Million Venture Fund
- Today: 2022 CISO Forum Virtual Event
- Cymulate Closes $70M Series D Funding Round
- SecurityWeek to Host CISO Forum Virtually September 13-14, 2022: Registration is Open
- Privilege Escalation Flaw Haunts VMware Tools
Latest News
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- Google Introduces SAIF, a Framework for Secure AI Development and Use
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds
- Consolidate Vendors and Products for Better Security
