White paper: Copilot for Microsoft 365,
the optimal adoption journey

EA and data theft

We recently posted on our Facebook and LinkedIn accounts a data point that may come as a surprise: 92% of companies that paid ransom after a cyberattack do not get their data back. (Forbes

 

Also, even if a company decides to pay the ransom, the data is not always handed over in full by the hackers. Electronic Arts, one of the world’s leading video game developers and producers, decided not to flinch and agree to pay the ransom after having data stolen in June.

 

Stolen data from EA

On June 10th, hackers stole source codes from EA. The stolen data totaled approximately 780 gigabytes.  

 

“No access to player data has been reported and we have no reason to believe that there is a risk to player privacy. Following the incident, we have already made security improvements and do not expect any impact on our games or business. We are actively working with law enforcement officials and other experts in this ongoing criminal investigation.” 

– EA spokesperson 

 

A month later, the hackers began publicly sharing some of the data in hopes that it would force EA to respond to the ransomware, but the company responded by stating: 

 

“We continue to believe that they do not contain data that poses any problem for player privacy, and we have no reason to believe that there is any material risk to our games, our business or our players.” 

-EA

Prevention at EA

Even if the theft of this data does not present any risk to the privacy of players, according to EA, it has nevertheless strengthened its computer security. A company can’t risk having sensitive data stolen, because the repercussions are major.  

 

To protect themselves, companies must start by finding their vulnerabilities, being aware of the risks, and taking the necessary steps to protect those vulnerabilities. At MS Solutions, we can help your business with our secure managed services offering, our enterprise cybersecurity solutions offering, and employee cybersecurity training.

 

To pay a ransom or not?

After paying the ransom, many hackers simply take the money, usually transferred by an untraceable payment method, and disappear. In some cases, they ask for more money after the first payment. Paying ransom is an uncertain risk to take. 

“Many of those who have paid the ransom have learned an old lesson: thieves have no honor.”

Employee awareness is the most effective way to avoid data theft and having to deal with ransomware.

In Short

We’ve seen and heard too many stories of companies that have suffered from a lack of cybersecurity. At MS Solutions, our mission is to protect our customers with the utmost security and prevent data leaks like the one suffered by EA. Contact one of our specialists to learn more about our secure outsourcing services. 

Share article:

This might interest you...

Cybersécurité

How an IT assessment works

An IT assessment allows you to obtain a factual report on the state of your IT infrastructure, both in terms of security and performance. Thanks

Subscribe to our newsletter

Soyez informé des prochains webinaires, des nouveaux services et des contenus d’intérêt.

Follow us