Get Started Today!  321-259-5500

croom new

Uber Demonstrates the Importance of Disclosing a Data Breach

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

In November of 2016, Uber was made aware that they had been breached, personal information from 57 million users and 600,000 United States-based drivers having been stolen by hackers. Uber quickly tried to hide the data breach, paying $100,000 to the hackers in exchange for the stolen data to be deleted and for their silence.

However, when Dara Khosrowshahi stepped in as CEO and learned about the breach, he quickly decided that the company had to come clean. As a result, Uber has now reached a settlement with the attorneys general of all 50 states and the District of Columbia. Under this settlement, Uber has to pay $148 million, as well as hire a third-party representative to routinely go over its data security measures and suggest improvements that Uber will have to adopt. Furthermore, Uber will also have to implement a “corporate integrity program.” This program will allow (or, more accurately, require) any ethical issues that employees raise to be addressed fully.

Uber is far from the only company who has kept data breaches under wraps for as long as they could. Google is finally pulling the plug on Google+, the search giant's failed attempt at social media, as the result of a security breach that potentially exposed 500,000 users… three years ago.

We would also be amiss if we didn’t mention Equifax, which not only had the data of over 146 million Americans exposed on its watch, but also waited over a month to report it. Not only that, but some employees have even been charged with insider trading after offloading all of their Equifax stock between learning of the breach and it being officially announced.

So, what does this have to do with you and your business?

Consider, for a moment, the data that your business has collected. Chances are, there is quite a bit of overlap in the data you have stored on your clients and customers as Uber or even Equifax has. Uber, Equifax, and certainly Google can all absorb this kind of event - perhaps not without some consequences, but these companies are big enough that they will be able to bounce back from them. Could you say with 100 percent certainty that the same could be said of your business?

In short, if you are to suffer a data breach, you need to be open about it and come clean. Chances are, your clients will still be upset with you, but there’s a big difference between “my data was breached” and “my data was breached and you didn’t tell me.”

However, if you do everything possible to make sure that your data isn’t breached in the first place, you may not have to worry about disclosing one to your patrons. TotalCareIT™ can help with our cybersecurity solutions and best practice training. For more information, reach out at 321-259-5500.

Tip of the Week: Don’t Let Former Employees Haunt ...
Understanding the Basics of Server Maintenance
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, March 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Malware Business Computing Email Hosted Solutions Internet IT Services Productivity Data Computer Network Security Backup Mobile Devices Software Productivity Microsoft Hardware Workplace Tips Ransomware Managed Service Provider Google User Tips Windows 10 Efficiency Tech Term Smartphone Android Business Continuity Innovation Disaster Recovery Small Business Cloud Computing Server IT Support IT Support Encryption Social Media Data Management Business Management Smartphones App Upgrade Network Data Backup Browser Managed IT Services Communication Windows Phishing Artificial Intelligence Data Recovery Office 365 BYOD Facebook Outsourced IT Passwords Internet of Things Apps Employer-Employee Relationship Windows 10 Office Paperless Office Gmail Big Data Save Money Microsoft Office Remote Monitoring Managed IT Services Hosted Solution Government Mobile Device Management VoIP Vendor Management WiFi Holiday Cybersecurity Two-factor Authentication Spam Collaboration Office Tips Firewall Wireless Technology Saving Money Alert Recovery Wireless Miscellaneous Vulnerability Risk Management Robot Wi-Fi Antivirus Money VPN Document Management How To IT Management Chrome Password Infrastructure Word Quick Tips Scam Virtualization Budget Tip of the week Avoiding Downtime communications Work/Life Balance IT solutions Managed Service Social Website Content Filtering Bandwidth Automation Hacker Customer Service Cybercrime Apple Education Tablet Hard Drives Bring Your Own Device Legal SaaS Politics BDR Mobile Device Twitter Tech Support Settings Computing The Internet of Things Blockchain Downtime Maintenance Storage Remote Computing IT service Information Machine Learning Analytics Customer Relationship Management Applications Healthcare Compliance Business Technology Going Green Unified Threat Management Data storage Virtual Reality Sports Computers Best Practice Private Cloud Search Data loss End of Support Printing Outlook Heating/Cooling Management Health Administration Computer Care Mouse Websites Lithium-ion battery Identity Theft Upgrades Safety Hacking File Sharing Operating System Electronic Medical Records Presentation Training Net Neutrality Business Owner Physical Security G Suite Botnet Augmented Reality Competition Point of Sale Chromebook IBM Users Access Control Google Drive HIPAA Router Cortana User Patch Management Telephone Systems Cost Management Taxes Monitors Virtual Desktop YouTube eWaste Running Cable Unified Communications Automobile Data Security How To Samsung Server Management Mobile Security Business Intelligence Solid State Drive User Error LiFi Virtual Private Network Network Management Regulations Remote Monitoring and Management Bitcoin Administrator Techology Cooperation Computer Repair Undo Consulting Cleaning Firefox Break Fix Writing Notifications Recycling IP Address Analyitcs Lenovo Hotspot OneNote Notes CCTV Black Friday Black Market Star Wars Instant Messaging Development 5G Tech Terms Meetings Multi-Factor Security Mirgation Nanotechnology Public Speaking Files Experience iPhone Mail Merge Touchscreen Microsoft Excel Mobile Office Zero-Day Threat Windows 8 Cabling Unified Threat Management Staff Managed Services Provider Dark Web Retail Crowdsourcing Business Growth Marketing Superfish Language Refrigeration Employee-Employer Relationship PowerPoint Troubleshooting Digital Cyber Monday Network Congestion Assessment Finance Cables Theft Webcam Google Calendar Humor Chatbots Update Screen Reader Read Only Deep Learning Gadgets Address Company Culture Human Error Buisness Hacks Printer Wearable Technology Motherboard E-Commerce Hiring/Firing Shortcut Social Engineering Laptop Alt Codes Google Maps Database Computing Infrastructure Remote Workers Professional Services Co-managed IT Save Time Spyware Smart Technology Display Processors Internet Exlporer Authentication Permissions 3D Printing Wires Financial Information Technology Entrepreneur Legislation Identity Smart Tech Printers Supercomputer Managing Stress Permission Trending Travel Disaster Managed IT Features Staffing VoIP FCC Halloween Typing Error Voice over Internet Protocol Networking Alerts Wasting Time Statistics Distributed Denial of Service Hard Drive Authorization Servers Fraud Unsupported Software Application Fun Security Cameras Google Wallet Web Server Corporate Profile Comparison Dark Data Emoji Connectivity Bookmarks Identities IT Budget Enterprise Content Management Test CIO Current Events Motion Sickness Uninterrupted Power Supply SharePoint Google Docs Help Desk Modem GPS Time Management Title II Law Enforcement Scary Stories Cryptocurrency Windows 7 Backups Licensing Personal Information Monitoring IT Consultant Bluetooth Managed IT Service Cache Employees Digital Payment Mobile Data Relocation ROI Drones Environment Cameras WannaCry Specifications Social Networking IoT Favorites Mobile Computing Law Vulnerabilities RMM Hard Disk Drive Downloads IT Technicians Cookies Electronic Health Records Knowledge Tracking Online Gadget Flexibility CrashOverride Emergency Regulation USB Domains

      Latest Blog Entry

      As unfortunate as it is to hear, science has pretty definitely kyboshed the notion that multitasking works. However, while multitasking may not actually have any true benefits to productivity, this doesn’t mean that there aren’t any ways to accomplish more in less time. Toda...

      Account Login