How would we describe PrivacyCon 2020? Is it Burning Man without the flames? The New Orleans Jazz Festival – minus the jazz and the festival? The best way to know what PrivacyCon is all about is to mark your calendar for July 21, 2020, and attend the FTC’s fifth annual gathering of leading privacy researchers. And check out our Call for Presentations to see if PrivacyCon would be a good forum for your recent research.
Blog Posts Tagged with Data Security
Wondering what small and midsize businesses (SMBs) think about cybersecurity? Or maybe you work for a small or midsize business that would like to tell someone what you think. Here’s your chance. The Information Technology Sector Coordinating Council (IT SCC) and Department of Homeland Security (DHS) just released a voluntary survey about SMB cybersecurity practices – and they asked us to help get the word out.
According to musical legend, a buddy of songwriter Jim Weatherly commented that his girlfriend was leaving on the “midnight plane to Houston.” The buddy was Lee Majors of Six Million Dollar Man fame and his girlfriend (and later wife) was actress Farrah Fawcett. Mr. Weatherly filed the phrase away and later used it as inspiration for his megahit, Midnight Train to Georgia.
Patch your software. Segment your network. Monitor for intruders. According to tech experts, those are security basics for businesses of any size. But when you’re industry giant Equifax – a company in possession of staggering amounts of highly confidential information about more than 200 million Americans – it’s almost unthinkable not to implement those fundamental protections.
The FTC has been keeping a close watch on the Internet of Things since the Internet of Things became a thing to watch. That includes law enforcement actions against companies alleged to have sold vulnerable connected devices that put consumers’ sensitive information at risk. Affected devices could even become – in effect – zombies that do the bidding of malicious botnets that threaten the Internet.
Whether you’re taking the midnight train to Georgia, a quick trip on MARTA, or a drive around the Perimeter on your way to one of the many Peachtree Streets, meet us in Atlanta on Thursday, August 15, 2019, for Green Lights & Red Flags: FTC Rules of the Road for Business.
The stars are aligning – the privacy and security stars, that is. The FTC’s fourth PrivacyCon convenes today, June 27, 2019. Experts from around the globe will discuss their latest research into privacy and data security, and the consumer protection implications of their findings. Minutes before FTC Chairman Simons convenes PrivacyCon at 9:15 ET this morning, visit the event page to watch the webcast live. Join the discussion on Twitter, using the hashtag #PrivacyCon19.
In just a few years, the FTC’s PrivacyCon has become an Information All-Star Game, complete with panels as high-flying or power-hitting as the Slam Dunk Contest or Home Run Derby. (OK. High-flying and power-hitting if you’re a researcher, academic, or advocate interested in data security and consumer privacy.) The FTC just announced the agenda for the fourth annual PrivacyCon on June 27, 2019. Consult your calendar and save the date.
The domino principle. The ripple effect. The butterfly phenomenon. Apply the analogy of your choice to describe what happens when one software developer’s allegedly lax security practices result in the breach of confidential customer information maintained by multiple businesses that use the software.
Racing to finish your comment about proposed changes to the Safeguards Rule by the impending deadline? You can take a breather because the FTC has extended the deadline by 60 days.
It’s National Small Business Week, a time when we celebrate the businesses that make our communities thrive. For the FTC, it’s an opportunity to let business owners know that when it comes to protecting your business from cyber threats, you’re not alone. The federal government has resources to help you address common cyber threats and create a culture of cybersecurity at your company. The materials at FTC.gov/Cybersecurity were introduced last year in cooperation with DHS, NIST, and the SBA.
Kids love to play dress-up, but parents wouldn’t want them rummaging through the attic or climbing to the top shelf of the wardrobe without permission and proper supervision. The i-Dressup.com website offered users – including children – a virtual way to play dress-up and design clothes without those potential dangers.
Suppose a lunch companion says, “I think there’s something wrong with this tuna salad.” To determine if the problem is tuna not to their taste vs. tuna gone bad, would you scarf it down? Probably not. Now remove tuna salad from the example and substitute a web browser extension. (Stay with us here.) Let’s say you’ve been warned that an unknown extension could be used for fraud. Should you download it and let it marinate in your company’s network?
If you sell genetic testing kits to consumers, you’re probably familiar with the Genetic Information Nondiscrimination Act (GINA), which prohibits discrimination on the basis of genetic information under some circumstances. You’re also familiar with the Health Insurance Portability and Accountability Act (HIPAA), which protects health information collected by certain types of entities. Then there are laws enforced by the FDA and the Centers for Disease Control and Prevention that pertain to genetic testing kits.
Looking to take a deep dive into the breadth and depth of the FTC’s approach to consumer privacy and data security in the past year? The FTC’s website, including the Business Center, has what you need. But what if you or your clients prefer an at-your-fingertips digest of developments in 2018? We’re got that covered, too.
When it came to designing the FTC’s Cybersecurity for Small Business campaign, you called the shots. We hosted round tables across the country and listened to what business owners had to say. You told us you wanted: 1) No-nonsense advice that’s easy to implement; and 2) Consistent guidance from the different federal agencies that deal with cyber threats and data security.
Punching a time clock in and out isn’t how small businesses run these days. Employees are on the road, others are working from home, vendors are accessing your data at off hours – and you’re generating ideas 24/7. How do you maintain high security standards when employees and others may need to connect to your network remotely from a variety of devices? When we met with small business owners across the country, that question came up a lot.
Your website is the online face of your business. Some companies have the in-house capability to manage their web presence. Others hire a web host to handle it for them. When launching a new business or upgrading their site, savvy business owners comparison shop for web hosting services. At the top of your shopping list should be the security features built into what you’re buying.
As a business person, you know about phishing, of course. At first glance, the email looks like it comes from a recognized company, complete with a familiar logo, slogan, and URL. But it’s really from a cyber crook trying to con consumers out of account numbers, passwords, or cash. In addition to the serious injury these scams inflict on consumers, there’s another victim of phishing: the reputable business whose good name was stolen by the scammer.
Steely Dan may be one of the best duos of the rock era. (Sorry, Donnie and Marie fans.) Their song “Hey Nineteen” reminds us to mention some FTC consumer protection developments that could be of interest to your company or clients in 2019. As “Any Major Dude Will Tell You,” when you’re “Reelin’ in the Years” – or at least recapping the past one – consider this non-exhaustive and in-no-particular-order case compilation.