Blog, Events & Press

8 Dec

How Do You Miss 100TB of Data?

Transfer of Numbers and Shapes in a Virtual Environment

You may be familiar with the recent cyberattack on Sony Pictures Entertainment. The devastating breach forced the company to terminate network access across the organization. As of this blog post, Sony continues to work towards restoring its technical infrastructure.

An article published by the LA Times suggests the security breach could have a significant economic impact. Legal fees, cybersecurity investigations, and lost revenue could equate to tens of millions of dollars. If you remember, it was just three years ago when Sony's PlayStation Network was the victim of a hack that cost the company an estimated $170 million.

The group responsible for the cyber-attack claims it stole up to 100TB of data. Sensitive documents captured during the security breach reportedly include:

  • Contracts between Sony Pictures Television and various TV stations
  • Preview copies of Sony movies
  • A list of employee salaries and bonuses
  • Social Security numbers and birth dates
  • Password files
  • HR employee performance reviews
  • Criminal background checks and termination records
  • Network maps and outlines
  • Passport and visa information for Hollywood stars
  • Internal phone list, organizational chart, and cell phone numbers

The nature of the cyberattack on Sony Pictures Entertainment underscores the importance of anomaly detection. How was it that hackers were able to transfer up to 100TB of data outside of Sony's network and no one noticed?

Performance monitoring can help. When monitoring your infrastructure, it's critical that you understand behavior that's unique. Anomaly detection is one of the best ways to pinpoint potential performance issues. Or even a security intrusion, such as a 100TB spike in illicit network traffic.

Your monitoring platform should automatically baseline every metric it collects. This provides a historical reference point for any given time of the day and day of the week. You can then receive real-time alerts when something abnormal occurs within your environment.

Baseline alerting is just one of the 6 Steps to an Effective Performance Monitoring Strategy. Download our whitepaper now to learn more.

Subscribe To Our Blog