Uber Secure

Singing in the Rain

Ever tried to hail a cab at night, in the rain, in Manhattan? Even worse, in a metro market where taxi service is not as fluid? Even if you haven’t, you can probably imagine how innovative an app-based cab service could be. Uber and others are filling this niche in markets across the country and around the globe. The service is almost a seamless hybrid of social media and carpooling, and it’s a great example of how technology is changing the way we interact with each other and the world.

Life in the Fast Lane

As with your organization, progress and innovation does not come without friction and complications. In late 2014, Uber reported a traffic problem that did not involve other cars. Instead, the traffic had been unauthorized passengers on their network on May 13, 2014. While the company maintains it was a one-time incident, the breach resulted in the carjacking of data from 50,000 drivers in the Uber system, including names and driver’s license numbers.

Those numbers are relatively small in the context of recent breaches, of course, unless you are one of the 50,000. But the incident demonstrates the vulnerability of even the hippest, edgiest, and most tech savvy companies. What does that say about other, more established organizations who might be asleep at the wheel?

The Need for Speed

Your business depends on timely access to safe and secure data, connecting your products and services with your customers and prospects in compelling and reliable fashion around the clock and around the globe. It’s part of what drives your business.

ICS invites you to take a test drive. Get behind the wheel of our industry-leading services and technologies and feel the difference of confident cybersecurity. You’ll never look in the rearview mirror again.

ICS. Who’s driving your security?

ISO 9001 2015Technology Industry InnovatorsVeteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor