Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Uber Demonstrates the Importance of Disclosing a Data Breach

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

In November of 2016, Uber was made aware that they had been breached, personal information from 57 million users and 600,000 United States-based drivers having been stolen by hackers. Uber quickly tried to hide the data breach, paying $100,000 to the hackers in exchange for the stolen data to be deleted and for their silence.

However, when Dara Khosrowshahi stepped in as CEO and learned about the breach, he quickly decided that the company had to come clean. As a result, Uber has now reached a settlement with the attorneys general of all 50 states and the District of Columbia. Under this settlement, Uber has to pay $148 million, as well as hire a third-party representative to routinely go over its data security measures and suggest improvements that Uber will have to adopt. Furthermore, Uber will also have to implement a “corporate integrity program.” This program will allow (or, more accurately, require) any ethical issues that employees raise to be addressed fully.

Uber is far from the only company who has kept data breaches under wraps for as long as they could. Google is finally pulling the plug on Google+, the search giant's failed attempt at social media, as the result of a security breach that potentially exposed 500,000 users… three years ago.

We would also be amiss if we didn’t mention Equifax, which not only had the data of over 146 million Americans exposed on its watch, but also waited over a month to report it. Not only that, but some employees have even been charged with insider trading after offloading all of their Equifax stock between learning of the breach and it being officially announced.

So, what does this have to do with you and your business?

Consider, for a moment, the data that your business has collected. Chances are, there is quite a bit of overlap in the data you have stored on your clients and customers as Uber or even Equifax has. Uber, Equifax, and certainly Google can all absorb this kind of event - perhaps not without some consequences, but these companies are big enough that they will be able to bounce back from them. Could you say with 100 percent certainty that the same could be said of your business?

In short, if you are to suffer a data breach, you need to be open about it and come clean. Chances are, your clients will still be upset with you, but there’s a big difference between “my data was breached” and “my data was breached and you didn’t tell me.”

However, if you do everything possible to make sure that your data isn’t breached in the first place, you may not have to worry about disclosing one to your patrons. Central Technology Solutions can help with our cybersecurity solutions and best practice training. For more information, reach out at 1-844-237-4300.

Should You Outsource Your IT Project’s Management?
Understanding the Basics of Server Maintenance


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, March 22 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers IT Services Internet Data Network Security Productivity Outsourced IT Managed IT Services Software Productivity Data Backup IT Support Business Mobile Devices Innovation Data Recovery Ransomware Tech Term Computer Hardware Microsoft Cloud Computing Small Business Google Backup Business Continuity Internet of Things Smartphone Efficiency Managed Service Provider Business Management Remote Monitoring Android Upgrade User Tips IT Support Disaster Recovery Windows 10 VoIP Smartphones Data Management Encryption Paperless Office Social Media Communication Artificial Intelligence Phishing Windows Browser Workplace Tips Managed IT Windows 10 Save Money Collaboration BYOD Facebook Cybersecurity Risk Management Mobile Device Management Holiday Mobile Device App Server communications Saving Money Apps Government Firewall Wi-Fi Applications Document Management Unified Threat Management Managed IT Services Passwords Gmail Robot Compliance Bring Your Own Device Employer-Employee Relationship Network BDR Vendor Management Bandwidth Automation Recovery Office 365 Website IT Management Content Filtering Tip of the week Scam Healthcare Money Project Management Antivirus SaaS Data storage Telephone Systems Big Data Going Green Infrastructure Chrome Wireless Managed Service Microsoft Office Vulnerability Business Technology Password Information Virtualization Hosted Solution Analytics Files Help Desk Apple Customer Service Politics Social Virtual Reality Work/Life Balance Quick Tips Router Miscellaneous Two-factor Authentication Computing VPN Regulations Training Customer Relationship Management Office IT Service Unified Communications Computers Data Security Printing Data loss File Sharing Blockchain Storage Tablet Remote Computing Settings Employees Administration Uninterrupted Power Supply Business Growth Company Culture Education Chromebook LiFi Flexibility Avoiding Downtime Private Cloud Tech Support IT solutions Mobile Computing Word Hacker Redundancy Digital Payment Upgrades Software as a Service Websites Identity Theft Wireless Technology Legal Sports Twitter The Internet of Things Licensing Management Smart Technology Remote Monitoring and Management Maintenance End of Support Health Net Neutrality Patch Management Budget Remote Workers Information Technology Virtual Private Network Users Monitors Electronic Medical Records Machine Learning Mobility Operating System Network Management Spam Alert Internet Exlporer HIPAA Mouse Assessment WiFi IoT Outlook YouTube How To Server Management Downtime Access Control Google Drive How To Samsung Mobile Security Windows 7 Legislation IT Technicians Tracking High-Speed Internet Consultation Lenovo Safety Permissions Nanotechnology G Suite History Star Wars Monitoring Dark Data Personal Information Taxes Google Wallet Conferencing Address Break Fix Social Networking Google Maps Asset Tracking Statistics Professional Services SharePoint Staff Digital Obstacle Virtual Desktop Black Friday Roanoke — Central Technology Solutions IT Budget Hard Drives Google Docs MSP RMM Disaster Resistance Security Cameras Notifications Unified Threat Management Hotspot Recycling Cyberattacks Mirgation Development Zero-Day Threat Superfish Black Market Fraud Screen Reader Cabling Utility Computing Humor Consulting Search Drones Managing Stress Instant Messaging Writing Emoji Dark Web Motherboard Backups OneNote Bluetooth Virtual Assistant Downloads Augmented Reality eWaste Read Only Spyware Course Network Congestion Cyber Monday technology services provider Solid State Drive Proactive Tech Terms Proactive IT Remote Worker User Error Language Point of Sale Deep Learning Computer Repair Migration Cables Backup and Disaster Recovery Smart Tech Current Events Managed Services Provider Shortcut Telephony Alt Codes Enterprise Content Management Finance Firefox Marketing Retail Cortana Data Warehousing Sync Employee-Employer Relationship Physical Security Wasting Time Operations Gadgets Display Technology Assurance Group ’s 18 Public Cloud Cryptocurrency Theft Heating/Cooling IT Consulting Buisness 3D Printing ROI Computing Infrastructure Law Enforcement Technology Tips Chatbots Botnet Wires Human Error Time Management Networking Processors Travel Cost Management E-Commerce WannaCry Multi-Factor Security Wearable Technology Typing Vulnerabilities Authentication Microsoft Excel Modem Mobile Device Managment Software Tips Hacks Connectivity Hacking Office Tips Database Best Practice Enterprise Resource Planning Bookmarks Update Distributed Denial of Service Annual Convention Automobile Computer Care Bitcoin WPA3 Financial Servers Data Breach Unsupported Software Notes Virus Printer Alerts Gadget Comparison Identity Permission Hard Drive Features Google Calendar GPS Geography Authorization Social Engineering USB Cookies Disaster Trending Voice over Internet Protocol Mobile Favorites Mail Merge Managed IT Service San Diego Windows 8 Save Time Fleet Tracking Procurement Technology Laws Mobile Data PowerPoint Cooperation VoIP Sponsor Specifications Supercomputer Identities Test Touchscreen Techology Crowdsourcing Meetings Cache Electronic Health Records Webcam IT Consultant Error Cybercrime Hard Disk Drive Printers Web Server Emergency CrashOverride Cameras Motion Sickness CCTV Administrator Relocation Regulation