Skip to main content
Business Blog

Cybersecurity for small business: Vendor security

Date
Not many small businesses do business these days without the services of third-party vendors, some of whom have access to your company’s sensitive information. Even if you run a tight cybersecurity...
Business Blog

Cybersecurity for small business: Tech support scams

Date
An employee gets a phone call, pop-up, or email warning about a problem with the office computer. In an effort to be helpful – or perhaps concerned they clicked on something that caused the glitch –...
Business Blog

Data security hearings start today: Watch the webcast

Date
Y ou’ve probably been following the FTC Hearings on Competition and Consumer Protection in the 21st Century. The next two days of hearings – Tuesday, December 11th, and Wednesday, December 12th – will...
Business Blog

Cybersecurity for small business: Business email imposters

Date
When cyber crooks send messages trying to trick people into disclosing passwords or account information, they often mimic a recognizable email address to make it look like it’s coming from a trusted...
Business Blog

Everybody comment now?

Date
Willing to wager there’s no plausible connection between 90s dance group C + C Music Factory and the FTC’s just-announced request for public comment about the Red Flags Rule and the Card Issuers Rule...
Business Blog

Cybersecurity for small business: Phishing

Date
Phishing scammers have gotten more sophisticated. They still send out mass emails asking consumers for credit card numbers or bank account information. But they’re also targeting small businesses by...
Business Blog

Cybersecurity for small business: Ransomware

Date
Mention the word “ransomware” at a meeting of small business owners and you’ll feel the temperature in the room drop by 20 degrees. A ransomware attack is a chilling prospect that could freeze you out...
Business Blog

Cybersecurity for small business: Physical security

Date
An employee catches up on some work while visiting the local coffee shop. She grabs her Double Mocha to go, but accidentally leaves behind a flash drive with hundreds of Social Security numbers on it...
Business Blog

Cybersecurity for small business: Cybersecurity basics

Date
As a small business owner, you know that cyber criminals will steal data any place they can find it, whether it’s from a global giant or a Main Street store. So where can you find just-the-facts...
Business Blog

PrivacyCon 2019: Mark your calendar

Date
Take out your scheduler now and block out Thursday, June 27, 2019 . That’s the date of the FTC’s fourth annual PrivacyCon and you’ll want to be in on the action. PrivacyCon brings together...
Business Blog

Cybersecurity resources for your small business

Date
Small businesses are concerned about ransomware, email imposters, and other common cyber threats. So FTC staff hosted roundtables to ask business owners what we can do to help. You came from different...
Business Blog

Is your business prepared for an emergency? Is your data?

Date
When an emergency strikes, your business’s most vulnerable asset may not be in the stockroom or warehouse. It could be the data that has been central to your success. September is National...
Business Blog

Be discreet when you delete your fleet

Date
Thinking about replacing a company car or truck? Unless you take some security steps before selling the vehicle, you could be leaving behind a water bottle or two, some change under the seat – and a...
Business Blog

New law, new consumer rights

Date
Food experts don’t recommend it for your ground chuck or pork shoulder, but starting September 21, 2018, there’s something consumers can safely freeze, unfreeze, and then freeze again. It’s their...