Looking to take a deep dive into the breadth and depth of the FTC’s approach to consumer privacy and data security in the past year? The FTC’s website, including the Business Center, has what you need. But what if you or your clients prefer an at-your-fingertips digest of developments in 2018? We’re got that covered, too.
Blog Posts Tagged with Privacy and Security
The FTC’s ability to obtain information through subpoenas and civil investigative demands (CIDs) is critical to the task of investigating potential law violations. The FTC uses this authority deliberately and responsibly, avoiding unnecessary burdens on businesses and individuals and consistent with our obligations to enforce the law.
When it came to designing the FTC’s Cybersecurity for Small Business campaign, you called the shots. We hosted round tables across the country and listened to what business owners had to say. You told us you wanted: 1) No-nonsense advice that’s easy to implement; and 2) Consistent guidance from the different federal agencies that deal with cyber threats and data security.
Every year, millions of consumers tell us – and our partners – about the frauds they spotted. In 2018, we heard from 3 million people and learned a lot from the reports entered into our Consumer Sentinel database. Here are some notable facts from the Consumer Sentinel Network’s 2018 Data Book – including that a new category of scams has earned the unenviable right to chant "We’re #1."
We’ll confess to singing along to a Stevie Nicks song or doing an air guitar solo when no one’s looking. But some people take their lip syncing to the next level. More than 200 million people – 65 million of them in the U.S. – downloaded the Musical.ly app. It gave users a platform to create videos and synchronize them with popular songs. It also allowed users to interact directly with each other. That may sound like fun for aficionados, but it raises concerns for parents, especially given public reports that adults have used the Musical.ly app to contact children.
Punching a time clock in and out isn’t how small businesses run these days. Employees are on the road, others are working from home, vendors are accessing your data at off hours – and you’re generating ideas 24/7. How do you maintain high security standards when employees and others may need to connect to your network remotely from a variety of devices? When we met with small business owners across the country, that question came up a lot.
Your website is the online face of your business. Some companies have the in-house capability to manage their web presence. Others hire a web host to handle it for them. When launching a new business or upgrading their site, savvy business owners comparison shop for web hosting services. At the top of your shopping list should be the security features built into what you’re buying.
As a business person, you know about phishing, of course. At first glance, the email looks like it comes from a recognized company, complete with a familiar logo, slogan, and URL. But it’s really from a cyber crook trying to con consumers out of account numbers, passwords, or cash. In addition to the serious injury these scams inflict on consumers, there’s another victim of phishing: the reputable business whose good name was stolen by the scammer.
Steely Dan may be one of the best duos of the rock era. (Sorry, Donnie and Marie fans.) Their song “Hey Nineteen” reminds us to mention some FTC consumer protection developments that could be of interest to your company or clients in 2019. As “Any Major Dude Will Tell You,” when you’re “Reelin’ in the Years” – or at least recapping the past one – consider this non-exhaustive and in-no-particular-order case compilation.
Not many small businesses do business these days without the services of third-party vendors, some of whom have access to your company’s sensitive information. Even if you run a tight cybersecurity ship, what happens if your accountant loses a laptop or the payroll company that connects to your network experiences a security breach? Your business could be in jeopardy, of course, but that’s not all.
An employee gets a phone call, pop-up, or email warning about a problem with the office computer. In an effort to be helpful – or perhaps concerned they clicked on something that caused the glitch – the employee follows instructions to send money, turn over personal information, or provide access to your system. As a small business owner, you know it’s a tech support scam, but are you sure every member of your team has the savvy to spot it?
It’s Day 2 of the data security discussion, presented as part of the FTC Hearings on Competition and Consumer Protection in the 21st Century – and you can watch the webcast live.
When cyber crooks send messages trying to trick people into disclosing passwords or account information, they often mimic a recognizable email address to make it look like it’s coming from a trusted source – for example, from your company. It’s a practice called spoofing and it packs a double wallop. Not only does it put consumers at risk for identity theft, but spoofing can unfairly damage the reputation for trust you’ve worked hard to earn.
Phishing scammers have gotten more sophisticated. They still send out mass emails asking consumers for credit card numbers or bank account information. But they’re also targeting small businesses by imitating the look of messages your employees routinely receive.
Mention the word “ransomware” at a meeting of small business owners and you’ll feel the temperature in the room drop by 20 degrees. A ransomware attack is a chilling prospect that could freeze you out of the files you need to run your business. When FTC staff met with business owners across the country, you cited ransomware as a particular concern. New resources from the FTC can help protect your company from this threat.
An employee catches up on some work while visiting the local coffee shop. She grabs her Double Mocha to go, but accidentally leaves behind a flash drive with hundreds of Social Security numbers on it. When she returns, the flash drive is gone. Then there’s the staff member who needs to free up file room space. After he tosses a stack of old company bank records into the garbage, a dumpster diver spots the trash and walks away with a windfall.
The FTC hosted roundtables across the country asking small business owners how we can help you address the challenges of cybersecurity. Based on your feedback, we designed to-the-point tips now available at ftc.gov/cybersecurity. Last week we kicked off a 12-part every-Friday Business Blog series with cybersecurity basics.
As a small business owner, you know that cyber criminals will steal data any place they can find it, whether it’s from a global giant or a Main Street store. So where can you find just-the-facts security advice tailored to your needs? At ftc.gov/cybersecurity. The FTC has boiled it down to a dozen need-to-know topics for small businesses and we’ll address one each week in the Business Blog.