Summary of Inside the Sony Hack

Looking for the article?
We have the summary! Get the key insights in just 5 minutes.

Inside the Sony Hack summary
Start getting smarter:
or see our plans

Rating

9 Overall

10 Importance

8 Innovation

9 Style


Recommendation

In this unnerving article, Slate contributor Amanda Hess interviews multiple anonymous Sony Pictures employees, who give their perspectives on the enormous North Korean cyberattack on the company. The unprecedented attack on Sony’s complete digital infrastructure included blocking all company data from employee access and the hacking of highly sensitive personal employee information. Hess shines a light on what it felt like to be a Sony employee in the days and weeks following the attack. getAbstract recommends this article to anyone whose company maintains a digital presence.

In this summary, you will learn

  • Why various stakeholders criticized Sony Pictures’ response to the North Korean cyberattack in November 2014; and
  • How the cyberattack affected 7,000 Sony employees, past and present.
 

About the Author

Amanda Hess is a prolific writer for Slate, producing various articles about social media, the Internet and social issues. She is also a David Carr fellow at The New York Times.

 

Summary

On November 24, 2014, North Korea allegedly hacked Sony Pictures in response to the political comedy film The Interview, which humorously depicts the death of dictator Kim Jong-un. The hackers threatened to publicly release Sony data. The attack blocked all employees from Sony’s software, files and databases for weeks, leaving computers virtually useless. Employees relied on face-to-face conversations and handwritten communications to continue work, going well beyond their typical work schedules and job descriptions in order to keep Sony afloat. It took several days to set up loaner computers with barely adequate software and a temporary Internet connection.


More on this topic

By the same author

How Privacy Became a Commodity for the Rich and Powerful
How Privacy Became a Commodity for the Rich and Powerful
8

Customers who read this summary also read

The Hacked World Order
The Hacked World Order
9
How to Withstand a Cyberattack
How to Withstand a Cyberattack
8
The Music Industry and the Digital Revolution
The Music Industry and the Digital Revolution
8
Dark Territory
Dark Territory
8
Competing Against Luck
Competing Against Luck
9
Welcome to Zuckerworld
Welcome to Zuckerworld
7

Related Channels

Comment on this summary