How OneLogin responded to its breach and regained customer trust

After its second incident in less than 12 years, incoming OneLogIn CEO Brad Brooks saw the need to instill a security-first mindset in the company and relay that message to wary customers.

Data breaches have become ubiquitous in today’s businesses. In a world where companies of all shapes and sizes can become cyber attack victims, how you handle a data breach becomes critically important.

Maersk and Norsk Hydro were praised for their clear, concise, and transparent messaging and response to major ransomware attacks that crippled their operations. DoublePulsar’s Kevin Beaumont labeled Norsk Hydro’s “the best incident representation response plan I’ve ever seen,” and good incident response is good for business. Norsk’s share price at the time of this writing is actually higher than it was at the time of the incident, which resulted in the company reverting to largely manual operations in parts of its manufacturing business and estimated losses in excess of $40 million in lost productivity for the first week of the attack alone.

On the other hand, Equifax’s response to its 2017 breach was labelled a “haphazard and ill-conceived dumpster fire” by Brian Krebs. The company took over a month to reveal the breach and the terms of service of the website dedicated to responding to the incident included a waiver for joining any future class action lawsuits.

Identity and access management (IAM) provider OneLogin suffered two incidents in 12 months. Despite that setback, the company has recovered and recently secured a new round of funding, thanks in part to learning from its mistakes and showing customers how it has changed its security posture since then.

OneLogin suffers a breach

To continue reading this article register now

FREE Download: Get the Spring 2019 digital issue of CSO magazine today!