Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Uber Demonstrates the Importance of Disclosing a Data Breach

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

In November of 2016, Uber was made aware that they had been breached, personal information from 57 million users and 600,000 United States-based drivers having been stolen by hackers. Uber quickly tried to hide the data breach, paying $100,000 to the hackers in exchange for the stolen data to be deleted and for their silence.

However, when Dara Khosrowshahi stepped in as CEO and learned about the breach, he quickly decided that the company had to come clean. As a result, Uber has now reached a settlement with the attorneys general of all 50 states and the District of Columbia. Under this settlement, Uber has to pay $148 million, as well as hire a third-party representative to routinely go over its data security measures and suggest improvements that Uber will have to adopt. Furthermore, Uber will also have to implement a “corporate integrity program.” This program will allow (or, more accurately, require) any ethical issues that employees raise to be addressed fully.

Uber is far from the only company who has kept data breaches under wraps for as long as they could. Google is finally pulling the plug on Google+, the search giant's failed attempt at social media, as the result of a security breach that potentially exposed 500,000 users… three years ago.

We would also be amiss if we didn’t mention Equifax, which not only had the data of over 146 million Americans exposed on its watch, but also waited over a month to report it. Not only that, but some employees have even been charged with insider trading after offloading all of their Equifax stock between learning of the breach and it being officially announced.

So, what does this have to do with you and your business?

Consider, for a moment, the data that your business has collected. Chances are, there is quite a bit of overlap in the data you have stored on your clients and customers as Uber or even Equifax has. Uber, Equifax, and certainly Google can all absorb this kind of event - perhaps not without some consequences, but these companies are big enough that they will be able to bounce back from them. Could you say with 100 percent certainty that the same could be said of your business?

In short, if you are to suffer a data breach, you need to be open about it and come clean. Chances are, your clients will still be upset with you, but there’s a big difference between “my data was breached” and “my data was breached and you didn’t tell me.”

However, if you do everything possible to make sure that your data isn’t breached in the first place, you may not have to worry about disclosing one to your patrons. Central Technology Solutions can help with our cybersecurity solutions and best practice training. For more information, reach out at 1-844-237-4300.

Should You Outsource Your IT Project’s Management?
Understanding the Basics of Server Maintenance


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Email Privacy Hosted Solutions Hackers IT Services Internet Network Security Productivity Managed IT Services Outsourced IT Software Data IT Support Data Backup Business Productivity Mobile Devices Tech Term Innovation Ransomware Microsoft Computer Hardware Data Recovery Backup Cloud Computing Small Business Google Internet of Things Smartphone Managed Service Provider Business Continuity Windows 10 Smartphones Remote Monitoring Android Efficiency Disaster Recovery Social Media Data Management VoIP Browser Encryption Artificial Intelligence Paperless Office Managed IT User Tips Communication Windows Upgrade Facebook IT Support BYOD Business Management Save Money Mobile Device Phishing Collaboration App Cybersecurity Workplace Tips Mobile Device Management Windows 10 Risk Management Holiday Bring Your Own Device Wi-Fi Unified Threat Management Passwords Gmail Robot communications Server Network BDR Applications Firewall Saving Money Bandwidth Managed IT Services Recovery Government Employer-Employee Relationship Document Management Data storage Content Filtering Infrastructure Going Green Vulnerability Vendor Management Compliance Wireless SaaS Password Telephone Systems Big Data Chrome IT Management Office 365 Healthcare Virtualization Hosted Solution Tip of the week Scam Website Project Management Antivirus Money Apps Computing Customer Service Politics Customer Relationship Management Work/Life Balance Virtual Reality Managed Service Data loss Blockchain Information Data Security Printing Miscellaneous Regulations Analytics Remote Computing Training Office IT Service Unified Communications Computers Microsoft Office Storage File Sharing Apple Automation Social Router Files Two-factor Authentication Quick Tips Help Desk Patch Management Remote Workers IT solutions Tech Support Internet Exlporer Virtual Private Network Budget Digital Payment Upgrades Information Technology IoT Sports Websites Identity Theft Network Management HIPAA Twitter Access Control Assessment Business Technology Operating System Licensing How To Mobile Security Mouse Server Management Outlook End of Support Health Employees Google Drive Company Culture Uninterrupted Power Supply Settings Monitors Users Business Growth Electronic Medical Records Spam Machine Learning Mobility Alert Word WiFi YouTube Redundancy Downtime Tablet Mobile Computing The Internet of Things Hacker How To Samsung Administration Remote Monitoring and Management Flexibility Education Maintenance Wireless Technology Legal Chromebook LiFi Smart Technology VPN Avoiding Downtime Private Cloud Cabling WannaCry Microsoft Excel Modem Connectivity Multi-Factor Security Time Management Wearable Technology Networking Cryptocurrency Vulnerabilities Authentication Black Market WPA3 Financial Remote Worker Printer Alerts Enterprise Resource Planning Writing Bookmarks Emoji Distributed Denial of Service Hacking Annual Convention Point of Sale Typing Hard Drive Network Congestion Features Comparison Servers Identity Data Breach Hacks Permission Cookies Best Practice Computer Repair Google Calendar Bitcoin Geography Authorization Fleet Tracking Physical Security Marketing Procurement Telephony ROI Cooperation Mobile Retail Favorites Cortana Sync Disaster Managed IT Service Trending San Diego Law Enforcement Mail Merge Cache Display Electronic Health Records Buisness Public Cloud Specifications Technology Laws 3D Printing Gadgets Test Travel VoIP Permissions Sponsor Nanotechnology Star Wars Monitoring Botnet Legislation Touchscreen IT Technicians Techology Windows 8 Save Time High-Speed Internet Processors Social Networking Office Tips Asset Tracking SharePoint Consultation Staff Lenovo Identities Conferencing Mobile Device Managment Software Tips Break Fix Gadget Unified Threat Management Hotspot Address Recycling Cyberattacks Update Automobile Computer Care Black Friday Statistics Roanoke — Central Technology Solutions MSP Unsupported Software RMM Virus Digital Fraud Obstacle Screen Reader Google Wallet Utility Computing Consulting Mirgation Disaster Resistance Development Zero-Day Threat Dark Web Search Motherboard OneNote GPS Downloads Augmented Reality Superfish Hard Drives Google Docs Managing Stress Social Engineering Instant Messaging USB Mobile Data Tech Terms User Error Language eWaste Read Only Cyber Monday Bluetooth technology services provider Humor Proactive Crowdsourcing Meetings Spyware Course Smart Tech Drones Managed Services Provider Supercomputer Software as a Service Migration Proactive IT Backups Cables Backup and Disaster Recovery Data Warehousing Shortcut Deep Learning Dark Data Employee-Employer Relationship Personal Information Tracking Operations Solid State Drive Enterprise Content Management Safety Finance G Suite History Theft Taxes Security Cameras Firefox Computing Infrastructure Management Google Maps Technology Assurance Group ’s 18 Current Events Net Neutrality Alt Codes Cost Management E-Commerce IT Budget Technology Tips Heating/Cooling Chatbots IT Consulting Wires Human Error Notifications Virtual Desktop IT Consultant Emergency CrashOverride Error Cybercrime Web Server Regulation Notes Cameras Motion Sickness CCTV Administrator Relocation Hard Disk Drive Printers Webcam