Blog Posts Tagged with Data Security

Pages

Six steps toward more secure cloud computing

For businesses, cloud services are kind of like clouds. At their best, they can be soothing and expansive. But for companies that fail to appreciate the security implications, their ethereal presence may hide dangerous storms within. As cloud computing has become business as usual for many businesses, frequent news reports about data breaches and other missteps should make companies think carefully about how they secure their data.

Unemployment benefits fraud puts workers at risk of more ID theft

A large-scale scam involving phony unemployment benefits claims has been making headlines. Criminals, possibly based overseas, are filing claims for benefits, using the names and personal information of people who have not lost their jobs. The investigation is ongoing, but this much is known: the fraud is affecting tens of thousands of people, slowing the delivery of benefits to people in real need, and costing states hundreds of millions of dollars.

Asking for your insights into the Health Breach Notification Rule

Next on the FTC’s regulatory review calendar: the Health Breach Notification Rule. In place since 2009, the Rule requires vendors of personal health records and related entities that aren’t covered by HIPAA to notify individuals, the FTC, and, in some cases, the media when there has been a breach of unsecured personally identifiable health data.

Using Artificial Intelligence and Algorithms

Headlines tout rapid improvements in artificial intelligence technology. The use of AI technology – machines and algorithms – to make predictions, recommendations, or decisions has enormous potential to improve welfare and productivity. But it also presents risks, such as the potential for unfair or discriminatory outcomes or the perpetuation of existing socioeconomic disparities. Health AI offers a prime example of this tension.

May 13th workshop takes a closer look at the GLB Safeguards Rule

Turning eighteen was a momentous birthday for most of us and the same could be said for the Gramm-Leach-Bliley Act’s Safeguards Rule. Finalized in 2002 and in effect since 2003, the Safeguards Rule requires “financial institutions” to develop, implement, and maintain a comprehensive information security program for handling customer information.

FTC’s Privacy & Data Security Update for 2019 – and how you can use it

To review everything the FTC did in 2019 dealing with consumer privacy and data security – Enforcement, Advocacy, Rules, Workshops, Consumer Education, Business Guidance, and International Engagement – it could take days to compile all that information. The FTC has an easier way to share those developments with your company, clients, and colleagues.

Free webinar for businesses focuses on tax identity theft and cybersecurity

We know you’re busy with the business of your business. But we’re hoping for an hour of your time. Why? It’s tax season and tax identity thieves, government imposters, and cyber criminals are out in force. Find out how to help thwart them so you can keep focused on your bottom line.  

FTC consumer protection year in review offers 2020 vision for your business

They say hindsight is 20/20, but what about foresight? We’re not ones to prognosticate, but a look at notable FTC cases and initiatives from the past year suggests some topics likely to be top of mind in months to come. Here is a non-exhaustive list of issues in our 2019 rearview mirror and likely visible through the 2020 windshield.

New and improved FTC data security orders: Better guidance for companies, better protection for consumers

When Chairman Simons and I arrived at the FTC, one of our first priorities was to strengthen the FTC’s orders in data security cases. We’ve already made three major changes that improve data security practices and provide greater deterrence, within the bounds of our existing authority.

Free vulnerability scanning for your business

You know the importance of strong cybersecurity, but have you heard about free vulnerability testing? As part of its mission to protect the nation’s cyber infrastructure, the Department of Homeland Security’s Cyber-Infrastructure Security Agency (CISA) offers free vulnerability scanning to government, critical infrastructure, and private businesses.

When third-party service providers are party to sensitive data

Entrepreneurs wear a lot of hats. In addition to marketing their products, they’re responsible for operational functions like inventory, ordering, and the protection of customer data. Rather than managing all that millinery, some businesses turn to third-party service providers to run things behind the scenes. But what steps are those companies taking to secure the confidential consumer information in their possession?

Veterans: Make cybersecurity your business

As Veterans Day reminds us, no one knows better than members of the military why it’s critical to maintain a vigilant defense. The more than 2.5 million veterans who own small businesses can apply that principle at their companies, too. Hackers are looking to exploit weaknesses in data perimeters, and business owners can’t afford to lose time, money, and customer goodwill to a compromised network. Knowing some cybersecurity basics and putting them in practice will help you protect sensitive employee and consumer information and reduce the risk of a cyber attack.

Pages