Blog Posts Tagged with Data Security

Pages

Accounts deceivable

Perhaps you see cops on the beat when they pass by your office. Maybe you serve on a committee with the Chief of Police or have a relative in the Sheriff’s Department. However you cross paths with local law enforcement, do them — and yourself — a favor by telling them about Consumer Sentinel.

Gauge your app-titude

Today, tech-savvy entrepreneurs use mobile apps to build buzz, save money, and stay in touch on the go.  But how can you make sure all those apps you buy protect your privacy, keep your data secure, and wind up costing you exactly the advertised price?  OnGuardOnline, the federal government’s online safety and security site, has some questions to consider before you click DOWNLOAD.

Nitro in the trunk?

The French movie classic “The Wages of Fear” — remade in 1977 as “The Sorcerer” by American director William Friedkin — was a taut thriller about a team of toughs transporting a payload of volatile nitroglycerine to a remote location in South America.  They meet with hazards along the way:  a rope bridge hanging by a thread over a flood-swollen river, a boulder blocking a twisted mountain path, and a stretch of road so pot-holed it’s called “The Washboard.”

Taken aback by a hack attack?

Busy business executives and the attorneys who represent them need to unwind now and then.  If PlayStation is your diversion-of-choice — or the choice of family members — you’ve probably heard the news that Sony’s PlayStation Network and Qriocity service were hacked and that user data may have been compromised.  It’s not clear right now what info was stolen, but the services held user IDs and passwords, email addresses, birth dates, street addresses, credit card numbers, expiration dates, and payment histories.  Are you taking steps to reduce the risk of ID theft as a result of the hack?  H

Hacked Off by an Email Data Breach?

According to news reports, hackers recently accessed the database of Epsilon, a large marketing company that sends emails on behalf of banks, stores and other businesses.  Was your company an Epsilon client?  If so, the stolen information could make it easier for crooks to send emails that appear to be from your brand.

Here are a few things you can do to help your customers avoid a phishing attack that abuses your brand.

Welcome to Consumer University

As your customers' buying habits make clear, today’s consumer marketplace knows no borders.  That’s why the FTC and officials from nine Latin American countries are meeting in Washington, D.C., this week to consider the challenges of global consumer protection.

NCP Double-YOU

Break out the bubbly and raise a toast:  It's National Consumer Protection Week.  NCPW is an annual campaign sponsored by the FTC and nearly 30 other federal agencies, consumer groups, and advocacy organizations, in conjunction with state, county, and local government offices that are sponsoring events nationwide.  The goal?  To encourage consumers to take full advantage of their rights and make better-informed decisions.

Data Resellers Liable for Downstream Security Failures

Of course, no legitimate business would put out a welcome mat for crooks.  But as the FTC’s data security cases make clear, that’s the effect when companies fail to take reasonable steps to secure sensitive information in their possession — or data they allow others to access.  Three recent settlements with companies that resell credit reports illustrate that point.

Keeping it cool at WiFi hotspots

Whether you’re waiting to board an airplane or grabbing a quick cuppa at a neighborhood café, public wireless networks are a great way for busy professionals to keep connected.

Convenient?  Yes.  Secure?  Mmm, not so much.

Unfortunately, most hotspots don’t encrypt what goes over the internet.  So if you send email, manage your calendar, use social networks, or transmit financial data while using a public network, you make it easier for hackers to lift confidential info like user names, passwords, and account numbers.

New compliance resource for health care providers and health plans

If you work in the health care or HR field or have clients who do, you’ve probably run across it. A patient complains about a bill for medical services they didn’t receive. An employee who rarely goes to the doctor gets told they’ve reached the limit on their health benefits. Someone gets denied coverage because their medical records show a condition they don’t have.

Four Steps to Protecting Your Business from Con Artists

You've just opened an invoice for office supplies you didn't order or for a listing in a business directory. It’s the same invoice you got last week – but this one is stamped "Past Due." Perhaps one of your colleagues says there's someone hounding her on the phone, demanding payment for Internet services your business didn’t request. You refuse to pay, and the next thing you know, they're threatening to take you to court, or turn the bill over to a collection agency and ruin your credit.

Data Security: Copi-er That!

If your company keeps sensitive data like Social Security numbers, credit reports, account numbers, health records, or business secrets, you’ve probably instituted safeguards to protect that information, whether it’s stored in computers or on paper. That’s great.  But it’s time to take those safeguards a step further.

FTC’s EchoMetrix settlement: EULA-ppreciate this guidance on privacy disclosures

Parents are understandably concerned about keeping their kids safe online.  That’s why many moms and dads paid $3.99 a month for Sentry Parental Controls, software sold by EchoMetrix, Inc.  Once Sentry is installed on a computer, buyers can log into their online account to monitor activity on that computer, including web history, online chats, and password-protected IMs.

So far, so good.  But that wasn’t the only product marketed by EchoMetrix.

Pages