301-571-5040    Get SUPPORT

Washington Works Blog

Uber Demonstrates the Importance of Disclosing a Data Breach

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

In November of 2016, Uber was made aware that they had been breached, personal information from 57 million users and 600,000 United States-based drivers having been stolen by hackers. Uber quickly tried to hide the data breach, paying $100,000 to the hackers in exchange for the stolen data to be deleted and for their silence.

However, when Dara Khosrowshahi stepped in as CEO and learned about the breach, he quickly decided that the company had to come clean. As a result, Uber has now reached a settlement with the attorneys general of all 50 states and the District of Columbia. Under this settlement, Uber has to pay $148 million, as well as hire a third-party representative to routinely go over its data security measures and suggest improvements that Uber will have to adopt. Furthermore, Uber will also have to implement a “corporate integrity program.” This program will allow (or, more accurately, require) any ethical issues that employees raise to be addressed fully.

Uber is far from the only company who has kept data breaches under wraps for as long as they could. Google is finally pulling the plug on Google+, the search giant's failed attempt at social media, as the result of a security breach that potentially exposed 500,000 users… three years ago.

We would also be amiss if we didn’t mention Equifax, which not only had the data of over 146 million Americans exposed on its watch, but also waited over a month to report it. Not only that, but some employees have even been charged with insider trading after offloading all of their Equifax stock between learning of the breach and it being officially announced.

So, what does this have to do with you and your business?

Consider, for a moment, the data that your business has collected. Chances are, there is quite a bit of overlap in the data you have stored on your clients and customers as Uber or even Equifax has. Uber, Equifax, and certainly Google can all absorb this kind of event - perhaps not without some consequences, but these companies are big enough that they will be able to bounce back from them. Could you say with 100 percent certainty that the same could be said of your business?

In short, if you are to suffer a data breach, you need to be open about it and come clean. Chances are, your clients will still be upset with you, but there’s a big difference between “my data was breached” and “my data was breached and you didn’t tell me.”

However, if you do everything possible to make sure that your data isn’t breached in the first place, you may not have to worry about disclosing one to your patrons. Washington Works can help with our cybersecurity solutions and best practice training. For more information, reach out at 301-571-5040.

Should You Outsource Your IT Project’s Management?
Understanding the Basics of Server Maintenance


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Privacy Malware Hackers Network Security Business Email Software Tech Term Productivity Internet Hosted Solutions Data Backup Computer Data Backup Mobile Devices Managed IT Services User Tips Ransomware IT Support Microsoft Data Recovery Google Productivity Innovation Managed Service Provider IT Services Smartphone Outsourced IT Efficiency Social Media Encryption Hardware Cloud Computing Business Continuity Workplace Tips Android Office 365 Windows 10 Remote Monitoring Data Management Communication Small Business Business Management Collaboration Browser Paperless Office Windows 10 Smartphones Government Managed IT Services Save Money Server Disaster Recovery Bandwidth Unified Threat Management Phishing Infrastructure Tip of the week Antivirus BYOD Wi-Fi Vulnerability Work/Life Balance IT Management BDR Facebook App Cybersecurity Healthcare Artificial Intelligence Chrome SaaS Politics Upgrade Saving Money File Sharing Hosted Solution Document Management Office Scam Employer-Employee Relationship VoIP Password Two-factor Authentication Applications Network Money Windows Passwords Chromebook Mobile Device Virtual Reality Managed Service Apps Internet of Things Information Maintenance Word Risk Management How To Compliance Customer Relationship Management Holiday Big Data Blockchain Computer Care Website Firewall Gmail Regulations Downtime Samsung Taxes Electronic Medical Records Storage Physical Security Twitter IoT Training Computing Websites Wireless Robot Mobile Device Management Patch Management HIPAA Communications Vendor Management Meetings Recovery Remote Monitoring and Management Botnet Data loss Remote Computing Mobile Security Automobile Remote Workers How To Smart Technology Tech Support Machine Learning VPN Identity Theft Quick Tips Data Security Automation Point of Sale Hacker Business Technology Router Telephone Systems Server Management Virtual Private Network Alert G Suite Health Enterprise Content Management Bookmarks Lenovo Emoji Managed IT Service Modem Motion Sickness Users Asset Tracking Tech Terms Solid State Drive Statistics Crowdsourcing User Error Private Cloud Management Cyberattacks Digital Mail Merge Specifications IT Budget Customer Service MSP Human Error Cabling Computing Infrastructure Value Google Calendar Office Tips Tracking Development Authentication VoIP Techology Permissions Web Server USB Consulting WannaCry Shortcut Printer Wearable Technology Error Unified Communications Favorites Firefox Superfish Break Fix Cookies OneNote Theft Hard Disk Drive Bluetooth Personal Information Enterprise Resource Planning Files Spyware Address Update Black Friday Social Networking Digital Payment Spam Proactive Permission Financial Alerts IT Consultant Legal Legislation Chatbots Cables Authorization Avoiding Downtime Fraud Star Wars Cameras Dongle Managed Services Provider Monitors Access Control Staffing Bring Your Own Device Project Management Dark Web Nanotechnology Employee-Employer Relationship Mobile Read Only Cyber Monday Motherboard Cybercrime Test Disaster Heating/Cooling Social Notifications Licensing Sports Mouse Identity Administrator Wires Employees Time Management IT Solutions Law Enforcement Cost Management CCTV Service Level Agreement E-Commerce SharePoint Augmented Reality Vulnerabilities Conferencing Networking Virtualization Microsoft Excel Screen Reader Webcam Computer Repair Company Culture WPA3 RMM Uninterrupted Power Supply Servers Cooperation Education YouTube Search Tablet IBM Zero-Day Threat Network Management Upgrades Processors Hotspot Gadget Assessment Utility Computing Features Downloads IT Technicians WiFi The Internet of Things Geography Instant Messaging Smart Tech Managed IT Microsoft Office Managing Stress Help Desk Analytics Distributed Denial of Service Travel Gadgets Budget Fleet Tracking Operating System Unified Threat Management Staff Relocation Cleaning Electronic Health Records Settings Comparison Supercomputer Backup and Disaster Recovery IT Support Touchscreen Language Internet Exlporer Multi-Factor Security Mirgation GPS High-Speed Internet Finance Google Drive Cortana Black Market Connectivity Professional Services Monitoring Corporate Profile Outlook Miscellaneous Mobile Office Domains Hiring/Firing Fun Public Speaking Presentation CrashOverride Procurement Lithium-ion battery Wireless Technology 5G Printers Emergency Hard Drives Safety Marketing Regulation Competition IP Address