• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Examining the True Scope of the Sony Hack

The fallout from last year’s Sony Pictures hack is starting to take shape and so far the cost hasn’t been all that bad. Well, at least financially-speaking, anyway. Sony revealed it has budgeted a mere $15 million to cover “investigation and remediation costs” stemming from the breach.

First things first, we should probably point out “all that bad” is relative. For some organizations, an unexpected expense of $15 million would be more than enough to force them to shut off the lights and lock the doors for good. However, when you’re a division of Sony, spending $15 million to mop up after hackers can safely be described as not being “that bad.” To further put that into perspective, initial estimates had Sony spending somewhere in the neighborhood of $100 million to cover the costs of dealing with the hack. If you’ve prepared yourself to spend $100 million and only end up spending $15 million, it softens the blow a little.

Just because the financial costs didn’t reach worst case scenario levels, that doesn’t mean we should take the situation lightly. After all, the true fallout of the hack can’t be strictly measured in dollars and cents.   

One key issue to consider is the shakeup of Sony’s executive team. Sony Pictures co-chair Amy Pascal announced she would be stepping down from her position in order to pursue a career as a producer on Sony’s films. This likely had some connection to the fact that Pascal had become a polarizing figure after private emails swiped from her work account revealed controversial remarks she’d made about President Obama and his taste in movies.

Pascal had been a mainstay on Sony’s leadership team almost continuously since 1988, minus a brief sojourn to serve as the production president of Turner Pictures. Following the scandal, according to The New York Times, Pascal wasn’t pushed out, but she wasn’t exactly begged to stay either.  

But Pascal wasn’t the only executive whose private emails suddenly became a hot topic on the gossip pages. As the round-the-clock coverage of the scandal played out, dings to its overall corporate reputation and an erosion of consumer confidence in Sony seemed almost inevitable.

Eventually the hackers demanded Sony cancel the release of “The Interview,” a comedy about an assassination attempt on North Korean leader Kim Jong-un, fueling speculation that North Korea had a hand in what was taking place. Considering the hits Sony had already taken, it pulled the film. All that did was ignite a whole new set of criticisms and protests. Only this time they were coming from people who weren’t happy to see Sony give in to the hackers.    

Once again, even though the monetary costs may be lighter than expected, they don’t tell the full story. All of that negative press has a way of adding up and that’s not even taking into account the sudden leadership changes.

Prevention has to be the number one goal when it comes to security. Considering the ever-present state of belt-tightening many IT teams find themselves in, it can be tough to swing getting the latest and greatest security tools.

That’s where a partner like Arraya can help. Arraya is adept at crafting customized, efficient IT solutions. Arraya customers can rest easy knowing they’re not getting shackled with any more or any less than they need. Also Arraya can leverage its relationships with industry-leading tech providers to ensure customers are not only getting the right solutions for the job, but that they’re also getting it at the right price.

To find out more about Arraya, please visit www.ArrayaSolutions.com and don’t forget to follow us on Twitter: @ArrayaSolutions

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}