Blog Posts Tagged with Data Security

Pages

What’s on? PrivacyCon

What’s that sound? It’s the buzz of the crowd gathering this morning for the FTC’s second PrivacyCon. Leaders from academia, advocacy groups, and industry have convened for a day devoted to the latest research and trends about consumer privacy and data security.

Edge of ‘17

Just like the white winged dove sings a song,” you can count on the BCP Business Blog to celebrate the “Edge of Seventeen” – 2017, of course – with a recap of in-case-you-missed-it developments from 2016. (Sorry, Stevie Nicks. That was a stretch.) In no particular order, here is our take on ten noteworthy consumer protection actions from the year gone by.

Military Consumer: Sound Off!

The military community makes many of the same consumer decisions as their civilian counterparts. We all need to manage our money – and avoid rip-offs. But servicemembers and their families also face unique challenges, like frequent relocations and deployment. When a permanent change of station is on the horizon, a military family needs to rent or buy a new place to live, manage money while on the move, and be vigilant about dealing with businesses in an unfamiliar locale. A servicemember’s regular paycheck from Uncle Sam can make them a target for scammers.

Responding to a data breach?

You suspect that your business experienced a data breach. Maybe an employee lost a laptop, or a hacker got into your customer database, or information was inadvertently posted on your website. Whatever happened, you’re probably wondering what to do next. 

Protecting your business from ransomware

Ransom notes used to come in the form of pasted letters clipped from newspapers. Now datanappers gain entry through a weak spot in a company’s network, lock the business out of its own system, and hold files – including sensitive health or financial information – for ransom. Would you know how to react if your business is the next victim? And are you taking reasonable steps to reduce the risk of that happening?

Going to Chicago

You want to build data security into your product development pipeline, but what concrete steps should you take to put that into practice? You could sit down over coffee with executives from Fortune 500 companies, innovative start-ups, and leading security firms to download their expertise, but the cost could be substantial in time, access, and caffeine. The FTC has a better idea.

Pages