crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

In November of 2016, Uber was made aware that they had been breached, personal information from 57 million users and 600,000 United States-based drivers having been stolen by hackers. Uber quickly tried to hide the data breach, paying $100,000 to the hackers in exchange for the stolen data to be deleted and for their silence.

However, when Dara Khosrowshahi stepped in as CEO and learned about the breach, he quickly decided that the company had to come clean. As a result, Uber has now reached a settlement with the attorneys general of all 50 states and the District of Columbia. Under this settlement, Uber has to pay $148 million, as well as hire a third-party representative to routinely go over its data security measures and suggest improvements that Uber will have to adopt. Furthermore, Uber will also have to implement a “corporate integrity program.” This program will allow (or, more accurately, require) any ethical issues that employees raise to be addressed fully.

Uber is far from the only company who has kept data breaches under wraps for as long as they could. Google is finally pulling the plug on Google+, the search giant's failed attempt at social media, as the result of a security breach that potentially exposed 500,000 users… three years ago.

We would also be amiss if we didn’t mention Equifax, which not only had the data of over 146 million Americans exposed on its watch, but also waited over a month to report it. Not only that, but some employees have even been charged with insider trading after offloading all of their Equifax stock between learning of the breach and it being officially announced.

So, what does this have to do with you and your business?

Consider, for a moment, the data that your business has collected. Chances are, there is quite a bit of overlap in the data you have stored on your clients and customers as Uber or even Equifax has. Uber, Equifax, and certainly Google can all absorb this kind of event - perhaps not without some consequences, but these companies are big enough that they will be able to bounce back from them. Could you say with 100 percent certainty that the same could be said of your business?

In short, if you are to suffer a data breach, you need to be open about it and come clean. Chances are, your clients will still be upset with you, but there’s a big difference between “my data was breached” and “my data was breached and you didn’t tell me.”

However, if you do everything possible to make sure that your data isn’t breached in the first place, you may not have to worry about disclosing one to your patrons. Integrated Business Technologies can help with our cybersecurity solutions and best practice training. For more information, reach out at (918) 770-8738.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 20 November 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Business Computing Microsoft Best Practices Saving Money Productivity Workplace Tips Hosted Solutions IT Services Hackers Backup Email Malware Business Software Mobile Devices Data IT Support Hardware Small Business Network Communication Server Smartphones VoIP Computer Business Continuity Upgrade Innovation Google Windows Efficiency Mobile Device Management Disaster Recovery Data Backup Virtualization Microsoft Office Outsourced IT Miscellaneous Mobile Office Vendor Management Tech Term Holiday Network Security Gadgets Social Media BYOD User Tips Quick Tips Passwords Productivity Mobile Computing Android Smartphone Browser Internet of Things Data Recovery Managed IT services WiFi Bring Your Own Device Windows 10 The Internet of Things Best Practice Ransomware Users Spam Remote Monitoring Data Management Collaboration Save Money Trending Operating System Apple Remote Computing Artificial Intelligence Wireless Technology Alert Office Going Green Encryption Content Filtering Firewall History Customer Relationship Management Unified Threat Management Gmail Big Data Printer Tech Support Analytics IT Support IT Solutions Lithium-ion Battery Facebook Information Technology IT Consultant Current Events Maintenance App Cloud Computing Managed IT Router Applications Humor Two-factor Authentication Managed IT Services Saving Time Avoiding Downtime Antivirus Phishing Bandwidth Document Management Hard Drives Mobile Device Paperless Office Wi-Fi Windows 8 Employer-Employee Relationship Website Customer Service Phone System Government Apps Compliance Application Automation Virus Office Tips Retail Project Management Cybersecurity Fax Server IT service Digital Payment Chrome Outlook Health VPN Business Growth Risk Management Marketing Excel Hacking Computers Healthcare Infrastructure Administration Augmented Reality Presentation Vulnerability Budget Managed Service Training Computer Repair BDR Proactive IT Point of Sale Regulations Files Recovery Mouse Money Help Desk Running Cable Social User Error Net Neutrality Licensing Co-Managed IT Wireless File Sharing PowerPoint Social Networking Unified Communications Tablet Data Security Office 365 Inbound Marketing iPhone Password Competition Business Intelligence Network Congestion Recycling eWaste Downtime Remote Workers Search Virtual Desktop USB Piracy Business Owner Information Data loss Blockchain Sports HIPAA Hacker User Programming Redundancy Twitter Company Culture Analyitcs Education Machine Learning Safety Specifications Settings Flexibility Hosted Solution IBM Internet Exlporer Storage Cost Management Remote Monitoring and Management Mobility Smart Technology Data storage Cybercrime communications Save Time Mobile Security Wearable Technology Conferencing IoT Robot Hiring/Firing Windows 10 Alerts Printing Display End of Support LiFi Tip of the week Computing Statistics Scam Intranet LinkedIn Human Error Congratulations Dark Web Scheduling Fun Writing Chromebook Disaster Resistance Word Law Firm IT Development Video Surveillance Cooperation Motherboard Read Only G Suite Public Speaking Drones Windows 8.1 Update Employee-Employer Relationship Best Available Buisness Hard Drive Permission Data Warehousing Cortana Social Engineering IT Consulting Identities Cables Patch Management Staff Modem Bookmarks Travel Software as a Service Backups Environment CIO Cache Test Microsoft Excel Knowledge Politics Data Breach Solid State Drive Bluetooth Wires Operations Samsung Cookies Favorites Meetings Technology Tips Legal Online Currency Troubleshooting Debate Management Experience Telephony Technology Laws Heating/Cooling Alt Codes Computer Accessories Virtual Private Network Monitoring Crowdfunding Nanotechnology Instant Messaging Comparison Macro Consumers YouTube Enterprise Resource Planning How To Permissions IT Technicians Unified Threat Management Typing MSP Screen Reader Finance Identity Theft Black Friday IP Address Google Drive How To Mobile Assessment Fraud Mirgation Consulting Gaming Console Access Control Refrigeration Cryptocurrency Disaster Proactive Touchscreen Smart Tech Authentication Cyber Monday Google Docs Managing Stress IT Management Business Technology Managed Services Provider Private Cloud SharePoint Bitcoin Digital Signature Memory Connectivity Authorization Laptop Enterprise Content Management Network Management Migration E-Commerce Public Cloud Downloads Hacks WPA3 Documents Employees Distributed Denial of Service Adminstration Halloween Networking Entrepreneur Vulnerabilities Hotspot Chatbots Features 3D PC Care Sync Multi-Factor Security Undo Fleet Tracking PDF Value People Star Wars Zero-Day Threat Software Tips Managed IT Service 5G Scary Stories Virtual Reality Geography eBay Language Remote Support Identity Electronic Health Records Leadership Mobile Device Managment Google Calendar Asset Tracking Skype Streaming Media Utility Computing Backup and Disaster Recovery New Additions Break Fix Monitors SaaS Techology Deep Learning Print Server High-Speed Internet Text Messaging Server Management Computing Infrastructure Work Station Cyberattacks Legislation Domains Google Wallet OneNote

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code