301-571-5040    Get SUPPORT

Washington Works Blog

Uber Demonstrates the Importance of Disclosing a Data Breach

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

In November of 2016, Uber was made aware that they had been breached, personal information from 57 million users and 600,000 United States-based drivers having been stolen by hackers. Uber quickly tried to hide the data breach, paying $100,000 to the hackers in exchange for the stolen data to be deleted and for their silence.

However, when Dara Khosrowshahi stepped in as CEO and learned about the breach, he quickly decided that the company had to come clean. As a result, Uber has now reached a settlement with the attorneys general of all 50 states and the District of Columbia. Under this settlement, Uber has to pay $148 million, as well as hire a third-party representative to routinely go over its data security measures and suggest improvements that Uber will have to adopt. Furthermore, Uber will also have to implement a “corporate integrity program.” This program will allow (or, more accurately, require) any ethical issues that employees raise to be addressed fully.

Uber is far from the only company who has kept data breaches under wraps for as long as they could. Google is finally pulling the plug on Google+, the search giant's failed attempt at social media, as the result of a security breach that potentially exposed 500,000 users… three years ago.

We would also be amiss if we didn’t mention Equifax, which not only had the data of over 146 million Americans exposed on its watch, but also waited over a month to report it. Not only that, but some employees have even been charged with insider trading after offloading all of their Equifax stock between learning of the breach and it being officially announced.

So, what does this have to do with you and your business?

Consider, for a moment, the data that your business has collected. Chances are, there is quite a bit of overlap in the data you have stored on your clients and customers as Uber or even Equifax has. Uber, Equifax, and certainly Google can all absorb this kind of event - perhaps not without some consequences, but these companies are big enough that they will be able to bounce back from them. Could you say with 100 percent certainty that the same could be said of your business?

In short, if you are to suffer a data breach, you need to be open about it and come clean. Chances are, your clients will still be upset with you, but there’s a big difference between “my data was breached” and “my data was breached and you didn’t tell me.”

However, if you do everything possible to make sure that your data isn’t breached in the first place, you may not have to worry about disclosing one to your patrons. Washington Works can help with our cybersecurity solutions and best practice training. For more information, reach out at 301-571-5040.

Should You Outsource Your IT Project’s Management?
Understanding the Basics of Server Maintenance
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Productivity Malware Hackers Email Software Business Network Security Tech Term Hosted Solutions Internet Computer Data Data Backup Mobile Devices Ransomware Google IT Support User Tips Backup Efficiency Data Recovery Managed IT Services Microsoft Innovation Cloud Computing Small Business Productivity Hardware Outsourced IT IT Services Business Management Smartphone Paperless Office Managed Service Provider Collaboration Android Business Continuity Office 365 Workplace Tips Encryption Social Media Save Money Communication Windows 10 Remote Monitoring Browser Managed IT Services Smartphones Windows 10 Data Management Government Employer-Employee Relationship Holiday Server Phishing Disaster Recovery Bandwidth Wi-Fi Artificial Intelligence Internet of Things Passwords Cybersecurity BYOD App Apps Infrastructure Tip of the week Work/Life Balance Facebook Information Antivirus Scam Unified Threat Management Healthcare Vulnerability Upgrade IT Management Document Management Communications BDR VoIP Windows Two-factor Authentication Network Mobile Device Hosted Solution Office Chrome Password Compliance Blockchain Money Customer Relationship Management Managed Service Chromebook Big Data Politics Vendor Management Virtual Reality Automation Risk Management File Sharing How To Saving Money Maintenance Applications Quick Tips SaaS Word Virtual Private Network Tablet Automobile Computing Machine Learning Identity Theft Robot Bring Your Own Device Router Point of Sale Tech Support Remote Monitoring and Management Telephone Systems Social Employees Recovery Remote Workers Remote Computing Gmail G Suite Hacker Microsoft Office Company Culture Regulations Firewall Patch Management Storage Private Cloud Computer Care IoT Downtime Taxes Website Data loss Training Professional Services Alert Access Control HIPAA Websites How To Health Wireless Meetings Management VPN Mobile Security Mobile Device Management Samsung Botnet Data Security Physical Security Server Management Twitter Electronic Medical Records Business Technology Smart Technology Hotspot Assessment Webcam Enterprise Resource Planning Files Settings Personal Information Proactive ROI IT Support Permission Touchscreen Dongle Managed Services Provider Corporate Profile Outlook Downloads IT Technicians Education Cables Financial Authorization Google Drive Update Smart Tech Employee-Employer Relationship Solid State Drive Statistics Unified Threat Management Staff Augmented Reality Gadget Project Management Legal Lenovo Distributed Denial of Service Language Internet Exlporer Mobile Read Only Digital Mail Merge Comparison WiFi Notes Cabling Test Travel Service Level Agreement E-Commerce WannaCry Shortcut Notifications Multi-Factor Security Mirgation IBM Relocation Cleaning Wires Procurement VoIP Techology Connectivity Supercomputer Hard Disk Drive IT Solutions Bluetooth User Error The Internet of Things Vulnerabilities Conferencing Firefox Sports Superfish Managed IT Service Modem PowerPoint RMM Virtualization Computing Infrastructure Value Spyware Computer Repair Address Specifications Gadgets Budget GPS WPA3 Motion Sickness Utility Computing Features Monitors Google Calendar Security Cameras Zero-Day Threat Avoiding Downtime Permissions IT Budget Upgrades Processors Printer Wearable Technology Geography Instant Messaging Search Break Fix Cookies Tracking Fleet Tracking Virtual Assistant Disaster Operating System Heating/Cooling Alerts Web Server Managing Stress Help Desk Black Friday Social Networking Users Office Tips Electronic Health Records Legislation Chatbots Customer Service Error Printing Backup and Disaster Recovery Time Management Fraud Star Wars Digital Payment Monitoring IT Consultant High-Speed Internet Finance Networking Dark Web Nanotechnology Asset Tracking Software as a Service Uninterrupted Power Supply Tech Terms Cortana Servers Black Market Licensing Cameras Enterprise Content Management Bookmarks Cyber Monday Motherboard Cost Management Cyberattacks YouTube Crowdsourcing Mouse Identity Spam Staffing MSP Remote Worker Human Error Network Management Emoji Cybercrime USB Consulting Managed IT SharePoint Development Authentication Microsoft Excel Screen Reader Administrator OneNote Wasting Time Theft Cooperation Law Enforcement CCTV Unified Communications Favorites Analytics Presentation Hiring/Firing Lithium-ion battery Fun Wireless Technology 5G Safety Marketing Printers Competition Hard Drives IP Address CrashOverride Miscellaneous Regulation Mobile Office Domains Emergency Public Speaking