What Your Business Can Learn From Uber

What Your Business Can Learn From Uber's Mass Security Breach

It seems that Uber is still learning from its mistakes, even as it continues to grow at a rapid rate. But for other companies, the security breach provides a few key lessons.

Uber is certainly no stranger to controversy. In its relatively short existence, the company has faced protests, regulatory hurdles and been accused of implementing unfair competitive practices. Uber would no doubt argue that some of these incidents are simply part and parcel of being an industry disruptor. When a new player comes along, existing businesses will always try to maintain the status quo.

However, the company’s most recent scandal is anything but expected. Back in October 2016, Uber was hit by a huge cyberattack that resulted in personal information belonging to 57 million drivers and customers being stolen. Worse still, the data breach was only disclosed in November 2018, with Uber paying the hackers $100,000 to keep quiet.

It seems that Uber is still learning from its mistakes, even as it continues to grow at a rapid rate. But for other companies, the security breach provides a few key lessons. So, here are some essential things that your business can learn from the breach.

It can happen to anyone

One thing that is abundantly clear regarding the recent data breach, is that cyberattacks can affect businesses of all sizes. Uber has a $70 billion valuation and has received countless plaudits for the way that it has revolutionised the taxi industry. In fact, the company has become synonymous with disruption through the term “Uberisation.” If Uber can become the victim of a cyberattack, with its immense financial clout, then companies of all sizes are also vulnerable.

Choose your partners carefully

Looking at the Uber breach more closely, it has been confirmed that the stolen data was accessed via a third-party cloud-based service that the company was using at the time. This demonstrates why businesses should be extremely careful when choosing their partners, particularly when they are entrusting them with sensitive data.

Having said that, businesses should not view the breach as definitive evidence that they should store all of their data and manage all of their processes in-house. Working with a respected and experienced cloud provider can help prevent and mitigate the damage caused by cyberattacks.  Sungard AS provides disaster recovery as a service, for example, that can help to identify security flaws, replicate important data and establish a clear communication plan for your employees.

 

Your reaction is important

Uber also demonstrated to businesses in all industries exactly how not to react when suffering a data breach. The company waited more than a year before informing the affected parties that their data had been compromised, meaning that they had no idea that their information was in the hands of malicious actors. What’s more, by attempting to cover up the breach, Uber showed that it cared more about its own reputation than the security of its customers.

 

Now the breach is public, Uber also has to be more forthcoming regarding what customers should do next. The company should make it abundantly clear which official channels customers should use to change log-in details and help them to recognise the phishing emails that have already started to emerge. Sometimes, data breaches are difficult to prevent. Reacting appropriately, however, will go a long way to showing customers, clients and partners that your company takes security seriously.

About the Author

Matthew Walker Jones is a freelance writer in the security industry.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.