Blog Posts Tagged with Small Business

Pages

The FTC announces new cybersecurity education for small business

Last year, we heard from small business owners about their cybersecurity challenges at a series of roundtable discussions the FTC hosted with some of its partners. What we learned is that small business owners need and want information on how to keep their computer systems and business data safe. So we’re planning to provide that to them. Later this year, the FTC will launch a small business education campaign on cybersecurity, in partnership with other federal agencies.

“Amazing Wealth System” not so amazing, alleges the FTC

An FTC lawsuit alleges that money-making claims made by a related group of companies and individuals for their Amazing Wealth System are “amazing” all right – if by “amazing” you mean “not credible” or “unsupported by the facts.” The complaint charges the defendants with violating the FTC Act and the Business Opportunity Ru

Patchwork: Why do many mobile devices go without security updates?

Every business wants to forge an ongoing relationship with their customers. That principle takes on special significance for mobile device manufacturers when they need to issue security patches for the operating system software on their phones and tablets. Once devices are in consumers’ hands, are they getting the patches they need to protect against critical vulnerabilities? Are companies deploying those patches in a timely fashion and for a reasonable length of time?

In the market for a VPN app?

As a business person, you know that accessing the public Wi-Fi network in an airport lounge, coffee shop, or other location can be risky. Public networks aren’t very secure – or, well, private – and it could be easy for others to intercept your confidential business or personal data. But there are times when every executive has to be out and about. So what can you do to keep your mobile data private and secure? Some people use Virtual Private Network (VPN) apps to shield traffic from their mobile devices from prying eyes on public networks.

Hiring a web host? FTC has security tips for small businesses

Engage, connect, protect was the theme of a series of Small Business Security Roundtables the FTC sponsored last summer. We listened to businesses talk about the challenges they face in securing sensitive information and fending off cyber threats. We also heard that they want concrete advice from the FTC. For example, how can a small company – especially one that may not have the in-house expertise to host its own website – get down to business while also addressing these concerns?

Know the risks before investing in cryptocurrencies

As a business person managing your personal portfolio, you do your best to keep up with the latest financial news. You’ve been hearing more about cryptocurrencies and asking yourself “Hmmm.” Of course, it’s not just bitcoin. There are now hundreds of cryptocurrencies, which are a type of digital currency, on the market. They’ve been publicized as a fast and inexpensive way to pay online, but many are now also being marketed as investment opportunities. But before you decide to purchase cryptocurrency as an investment, here are a few things to know:

So You Received a CID: FAQs for Small Businesses

So you’ve received a Civil Investigative Demand (CID) from the Federal Trade Commission related to a consumer protection matter. Now what? We appreciate that it can be daunting for any company – especially a small business – and we want to be as transparent as possible about the process.

Is that B2B “free” offer really free?

If you own a small business or are active in a nonprofit, the alleged modus operandi of New York- and Illinois-based A1 Janitorial Supply Corp., three other companies, and two individuals should sound a warning. According to the FTC, the defendants called offices to offer a free sample of a cleaning product – but then cleaned up in an altogether different way.

The dark web: What your business needs to know

You’ve heard about the “dark web” and wondered how it affects businesses – including small businesses. That was one of the topics addressed at an FTC conference earlier this year on identity theft. Recent headlines about high-profile data breaches have added even more urgency to the discussion. So why should the dark web matter to your company?

Let’s focus on cybersecurity for small businesses

If you own a small business or work for one, you’re probably concerned with protecting your business’ data. You want to make sure that sensitive information isn’t accidentally deleted, turned over to a scammer, or hacked. So this week, during National Cybersecurity Awareness Month, let’s focus on making sure you know the resources the FTC has to help you and your employees understand cybersecurity, maintain your business’ computer networks safely, and keep sensitive information protected.

Stick with Security: Secure paper, physical media, and devices

High-profile hackers grab the headlines. But some data thieves prefer old school methods – rifling through file cabinets, pinching paperwork, and pilfering devices like smartphones and flash drives. As your business bolsters the security of your network, don’t let that take attention away from how you secure documents and devices.

How an “invention promotion” outfit demoted the truth

It sounds like there was some “inventing” going on at Florida-based invention promotion firm World Patent Marketing, but a Preliminary Injunction in a case brought by the FTC suggests it wasn’t the kind that unsuspecting consumers bargained for when they forked over millions of dollars based on the defendants’ misleading promises about patenting and promoting their products.

Stick with Security: Secure remote access to your network


Ask a business person where their office is located and the likely answer is “everywhere.” They’re working from home, staying in the loop while traveling, and catching up on email between sales calls. For productivity’s sake, many companies give their employees – and perhaps clients or service providers – remote access to their networks. Are you taking steps to ensure those outside entryways into your systems are sensibly defended?

Pages