Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Uber Demonstrates the Importance of Disclosing a Data Breach

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

In November of 2016, Uber was made aware that they had been breached, personal information from 57 million users and 600,000 United States-based drivers having been stolen by hackers. Uber quickly tried to hide the data breach, paying $100,000 to the hackers in exchange for the stolen data to be deleted and for their silence.

However, when Dara Khosrowshahi stepped in as CEO and learned about the breach, he quickly decided that the company had to come clean. As a result, Uber has now reached a settlement with the attorneys general of all 50 states and the District of Columbia. Under this settlement, Uber has to pay $148 million, as well as hire a third-party representative to routinely go over its data security measures and suggest improvements that Uber will have to adopt. Furthermore, Uber will also have to implement a “corporate integrity program.” This program will allow (or, more accurately, require) any ethical issues that employees raise to be addressed fully.

Uber is far from the only company who has kept data breaches under wraps for as long as they could. Google is finally pulling the plug on Google+, the search giant's failed attempt at social media, as the result of a security breach that potentially exposed 500,000 users… three years ago.

We would also be amiss if we didn’t mention Equifax, which not only had the data of over 146 million Americans exposed on its watch, but also waited over a month to report it. Not only that, but some employees have even been charged with insider trading after offloading all of their Equifax stock between learning of the breach and it being officially announced.

So, what does this have to do with you and your business?

Consider, for a moment, the data that your business has collected. Chances are, there is quite a bit of overlap in the data you have stored on your clients and customers as Uber or even Equifax has. Uber, Equifax, and certainly Google can all absorb this kind of event - perhaps not without some consequences, but these companies are big enough that they will be able to bounce back from them. Could you say with 100 percent certainty that the same could be said of your business?

In short, if you are to suffer a data breach, you need to be open about it and come clean. Chances are, your clients will still be upset with you, but there’s a big difference between “my data was breached” and “my data was breached and you didn’t tell me.”

However, if you do everything possible to make sure that your data isn’t breached in the first place, you may not have to worry about disclosing one to your patrons. Central Technology Solutions can help with our cybersecurity solutions and best practice training. For more information, reach out at 1-844-237-4300.

Should You Outsource Your IT Project’s Management?
Understanding the Basics of Server Maintenance
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Email Privacy Malware Hackers Hosted Solutions IT Services Internet Productivity Managed IT Services Network Security Outsourced IT IT Support Data Software Data Backup Business Mobile Devices Ransomware Microsoft Tech Term Computer Productivity Backup Innovation Data Recovery Hardware Smartphone Managed Service Provider Google Business Continuity Internet of Things Cloud Computing Small Business Data Management Windows 10 Android Disaster Recovery Remote Monitoring Managed IT User Tips Communication Efficiency Browser Artificial Intelligence Encryption Social Media Paperless Office Windows Smartphones Facebook VoIP IT Support BYOD Workplace Tips Phishing Cybersecurity App Save Money Mobile Device Business Management Risk Management Collaboration Applications Gmail Server Recovery BDR Upgrade Network Mobile Device Management Firewall Robot Saving Money Government Unified Threat Management Website Money Bring Your Own Device Tip of the week Data storage Going Green Apps Project Management Content Filtering Passwords Vendor Management Virtualization Infrastructure Password Vulnerability Big Data Office 365 Wi-Fi Chrome Holiday Compliance Windows 10 Bandwidth SaaS Document Management Hosted Solution Telephone Systems Politics Regulations Managed IT Services Work/Life Balance Computing Office IT Service Computers Antivirus Storage Employer-Employee Relationship Automation Wireless Customer Relationship Management Healthcare Training Two-factor Authentication Router Analytics Remote Computing Data Security Data loss File Sharing Help Desk Customer Service Unified Communications Files Virtual Reality Apple Managed Service Miscellaneous IT Management Redundancy End of Support Health Administration LiFi Education Digital Payment Quick Tips Scam Monitors Websites Identity Theft Budget IT solutions Microsoft Office Alert Licensing Information Technology VPN Printing Patch Management Mouse Sports How To Samsung The Internet of Things Outlook Virtual Private Network Maintenance Network Management Machine Learning Chromebook Mobility Smart Technology Google Drive Remote Monitoring and Management communications Flexibility Assessment Business Technology Avoiding Downtime Settings Remote Workers Business Growth Server Management Tablet How To Users Mobile Computing Uninterrupted Power Supply Spam Upgrades Internet Exlporer IoT Information YouTube HIPAA Hacker WiFi Twitter Blockchain Social Tech Support Wireless Technology Legal Word Mobile Security Star Wars Monitoring Legislation IT Technicians Alt Codes Bluetooth High-Speed Internet Employees Processors Permissions Nanotechnology Office Tips Point of Sale SharePoint Staff Proactive IT Company Culture Conferencing Break Fix Social Networking Cryptocurrency Spyware Course Asset Tracking Hotspot Recycling Cyberattacks Virtual Desktop Update Black Friday Roanoke — Central Technology Solutions Shortcut MSP Unsupported Software Virus Unified Threat Management Firefox Utility Computing Consulting Telephony Electronic Medical Records Mirgation Typing Development Zero-Day Threat Sync Fraud Screen Reader Hacks Law Enforcement Downloads Augmented Reality Best Practice Heating/Cooling IT Consulting Managing Stress Instant Messaging Social Engineering Public Cloud USB Dark Web Motherboard Bitcoin OneNote User Error Language Time Management Networking eWaste Read Only Botnet Cyber Monday technology services provider Operating System WannaCry Proactive Mobile Data Travel Managed Services Provider Software as a Service Migration Hacking Cables Mobile Device Managment Software Tips Smart Tech Dark Data Gadget Personal Information Operations Servers Data Breach Enterprise Content Management Finance Marketing Safety Automobile Computer Care Data Warehousing Windows 8 Save Time Employee-Employer Relationship Computing Infrastructure Management Gadgets Technology Assurance Group ’s 18 Identities Buisness Cost Management E-Commerce GPS Technology Tips Chatbots Disaster Trending Wires Human Error Notifications Net Neutrality Multi-Factor Security Wearable Technology Google Wallet Technology Laws Vulnerabilities Authentication Black Market Microsoft Excel Modem Mail Merge Connectivity Meetings Printer Alerts Touchscreen Techology Enterprise Resource Planning Bookmarks Writing Emoji Supercomputer Distributed Denial of Service Annual Convention Hard Drives Google Docs VoIP Sponsor WPA3 Crowdsourcing Humor Consultation Lenovo Hard Drive Features Network Congestion Tracking Comparison Identity Permission G Suite History Computer Repair Taxes Google Calendar Drones Statistics Geography Authorization Google Maps Cookies Backups Address Downtime Physical Security Access Control Cooperation Deep Learning Disaster Resistance Mobile Favorites Retail Private Cloud Cortana IT Budget Managed IT Service San Diego Solid State Drive Digital Obstacle Fleet Tracking Current Events Superfish Cache Electronic Health Records Display Specifications Search Test 3D Printing Cabling IT Consultant Error Hard Disk Drive Cybercrime Web Server Emergency Backup and Disaster Recovery Cameras CrashOverride Printers Motion Sickness CCTV Administrator Relocation Webcam Regulation