(281) 816-6430    Get SUPPORT

SouthBridge Consulting Blog

Uber Demonstrates the Importance of Disclosing a Data Breach

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

In November of 2016, Uber was made aware that they had been breached, personal information from 57 million users and 600,000 United States-based drivers having been stolen by hackers. Uber quickly tried to hide the data breach, paying $100,000 to the hackers in exchange for the stolen data to be deleted and for their silence.

However, when Dara Khosrowshahi stepped in as CEO and learned about the breach, he quickly decided that the company had to come clean. As a result, Uber has now reached a settlement with the attorneys general of all 50 states and the District of Columbia. Under this settlement, Uber has to pay $148 million, as well as hire a third-party representative to routinely go over its data security measures and suggest improvements that Uber will have to adopt. Furthermore, Uber will also have to implement a “corporate integrity program.” This program will allow (or, more accurately, require) any ethical issues that employees raise to be addressed fully.

Uber is far from the only company who has kept data breaches under wraps for as long as they could. Google is finally pulling the plug on Google+, the search giant's failed attempt at social media, as the result of a security breach that potentially exposed 500,000 users… three years ago.

We would also be amiss if we didn’t mention Equifax, which not only had the data of over 146 million Americans exposed on its watch, but also waited over a month to report it. Not only that, but some employees have even been charged with insider trading after offloading all of their Equifax stock between learning of the breach and it being officially announced.

So, what does this have to do with you and your business?

Consider, for a moment, the data that your business has collected. Chances are, there is quite a bit of overlap in the data you have stored on your clients and customers as Uber or even Equifax has. Uber, Equifax, and certainly Google can all absorb this kind of event - perhaps not without some consequences, but these companies are big enough that they will be able to bounce back from them. Could you say with 100 percent certainty that the same could be said of your business?

In short, if you are to suffer a data breach, you need to be open about it and come clean. Chances are, your clients will still be upset with you, but there’s a big difference between “my data was breached” and “my data was breached and you didn’t tell me.”

However, if you do everything possible to make sure that your data isn’t breached in the first place, you may not have to worry about disclosing one to your patrons. SouthBridge Consulting can help with our cybersecurity solutions and best practice training. For more information, reach out at (281) 816-6430.

Tip of the Week: Don’t Let Former Employees Haunt ...
Understanding the Basics of Server Maintenance
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Tech Term Productivity Privacy Email Internet Data Business Hosted Solutions Business Computing Data Backup Malware IT Support Cloud Cloud Computing Business Management Mobile Devices Computer Small Business Software Network Security Hackers Efficiency Hardware Outsourced IT Encryption Paperless Office IT Services Google Android Server Holiday Passwords Data Recovery Browser Windows 10 Government Innovation Managed IT Services Artificial Intelligence Smartphones BYOD Healthcare VoIP Infrastructure Wi-Fi Two-factor Authentication Document Management Applications Vulnerability Communication Blockchain Information Collaboration Ransomware Bandwidth Managed Service Website Office 365 Scam Workplace Tips Employer-Employee Relationship User Tips Social Media Automation Chrome Antivirus Mobile Security Bring Your Own Device Access Control Network Microsoft Management Managed IT services Machine Learning Business Technology Business Continuity IT Management Internet of Things Managed Service Provider Maintenance Data Management Router Tablet Storage Gmail Smartphone Backup Remote Monitoring HIPAA Quick Tips Upgrade Saving Money Legislation Fraud VPN Hard Drive Consulting Downtime Break Fix Virtual Reality Cookies Development Mobile Device Wireless Server Management Assessment Employee-Employer Relationship Test Spam Smart Technology Social Networking Unified Communications Help Desk Vendor Management Mobile Device Management Microsoft Excel Connectivity Employees Comparison Alerts Patch Management Private Cloud Instant Messaging Remote Computing Cache Managed Services Provider Tech Terms Nanotechnology Cables Risk Management Mirgation Internet Exlporer Remote Workers Communications Firewall Motherboard Office Phishing IoT Remote Monitoring and Management Specifications Compliance Electronic Health Records ROI Wires Finance Augmented Reality Hotspot Point of Sale Theft Cybersecurity RMM Tech Support BDR G Suite Bookmarks Wasting Time Apps SharePoint Data Security Star Wars Zero-Day Threat Black Friday Licensing Regulations Company Culture Files Notes App Facebook The Internet of Things Mouse Language Chatbots Network Management E-Commerce Financial Dark Web Microsoft Office Google Calendar Permissions Monitoring Electronic Medical Records Distributed Denial of Service Chromebook Favorites Downloads Cost Management OneNote Human Error Customer Relationship Management Cyber Monday Cooperation Data loss Managing Stress Read Only PowerPoint Wearable Technology Screen Reader Authentication Identity Theft Recycling Save Money Social Operating System Users Managed IT Service Modem Vulnerabilities Politics Multi-Factor Security IT Technicians How To Permission Customer Service Staff Disaster Recovery Enterprise Content Management Professional Services Printer Money Smart Tech Authorization Computing Computing Infrastructure Identity eWaste Features Security Cameras Domains Virtualization Hard Drives Regulation Windows 10 Search Public Speaking Presentation Lithium-ion battery Cortana Wireless Technology 5G Safety IBM Criminal Justice Productivity Marketing Hacker Alert Gadgets Budget Hiring/Firing Competition Big Data Fun IP Address Twitter Miscellaneous Printers Mobile Office