Skip to main content
Business Blog

Stick with Security: Control access to data sensibly

Date
You’ve conducted an information “census” to identify and locate the confidential data in your company’s possession. Then you determined what you need to hold on to for business purposes. What’s the...
Business Blog

Start with security – and stick with it

Date
When it comes to data security, what’s reasonable will depend on the size and nature of your business and the kind of data you deal with. But certain principles apply across the board: Don’t collect...
Business Blog

Stick with Security: Insights into FTC Investigations

Date
Savvy business people are on the lookout for ways to minimize their companies’ risk of a data breach. Many businesses consult the FTC’s complaints and orders, each of which includes a detailed...
Business Blog

Best practices to foil gas station skimmers

Date
If you own or operate gas stations, chances are you know about skimmers – illegal card readers attached to payment terminals, like gas pumps, that grab data off a credit or debit card’s magnetic...
Business Blog

Has a phishing scam hooked your company’s good name?

Date
When internet fraudsters mimic a legitimate business to trick consumers into giving out their personal information, it’s called phishing. It’s not just a problem for consumers, but for the companies...
Business Blog

Edge of ‘17

Date
“ Just like the white winged dove sings a song ,” you can count on the BCP Business Blog to celebrate the “Edge of Seventeen” – 2017, of course – with a recap of in-case-you-missed-it developments...
Business Blog

Ashley Madison settles with FTC over data security

Date
If you care about data security and privacy, you’ll want to read about the FTC’s settlement with ruby Corporation, ruby Life Inc., and ADL Media Inc. – the companies that operate AshleyMadison.com...
Business Blog

The NIST Cybersecurity Framework and the FTC

Date
We often get the question, “If I comply with the NIST Cybersecurity Framework, am I complying with what the FTC requires?” From the perspective of the staff of the Federal Trade Commission, NIST’s...
Business Blog

What happens when the sun sets on a smart product?

Date
The Internet of Things refers to consumer products that connect to the Internet to send and receive data – everything from fitness devices, wearables, and smart cars to connected smoke detectors...
Business Blog

2015’s top-pick topics: A 10-tative list

Date
2015 saw the end of The Late Show with David Letterman, but his Top 10 List legacy lives on. From the home office in Washington, D.C., here is our informal take on ten topics we covered this year in...
Business Blog

Oracle Java SE case serves up a cuppa caution

Date
When consumers updated Java SE, which has been installed on more than 850 million computers, Oracle Corporation promised “safe and secure access to the world of amazing Java content” and stated that...
Business Blog

Order compliance: A behind-the-scenes look

Date
If the Commission is to attain the objectives Congress envisioned, it cannot be required to confine its road block to the narrow lane the transgressor has traveled; it must be allowed effectively to...