Article Preview
TopLiterature Overview
Recently, Uber CEO, Dara Khosrowshahi, acknowledged a 2016 data breach in which the personal data, including phone numbers, email addresses, and names of 57 million Uber consumers. At the time of the data breach, Uber paid the hackers $100,000 to destroy the data and intentionally neglected to inform regulators or consumers of the incident until November of 2017 (Stump, 2017).
According to Larson (2017), 48 states have security breach notification laws. These laws require companies to disclose cyber incidents or theft of consumers' privacy information and critical human resource information (Larson, 2017). The Uber cybersecurity incident is one in a series of corporate and government security breaches that highlight the need for proven and effective cybersecurity security controls as well as personnel with the expertise to execute these objectives (Morgan, 2016a). According to Morgan (2016d) the five most cyberattacked industries in 2015 were:
- •
Healthcare
- •
Manufacturing
- •
Financial Services
- •
Government
- •
Transportation
Information security analysts (ISA) positions are expected to grow 18% through 2024 because ISAs are involved in mitigating cyber vulnerabilities in corporate networks (Morgan, 2016b). Crimes related to cyber costs businesses upwards of $400 billion annually accompanied by the rapid integration of technology, electronic communications, and digitalization efforts project the cost of cybersecurity breaches to $2.1 trillion globally by 2019 (Morgan, 2016b)