The military community makes many of the same consumer decisions as their civilian counterparts. We all need to manage our money – and avoid rip-offs. But servicemembers and their families also face unique challenges, like frequent relocations and deployment. When a permanent change of station is on the horizon, a military family needs to rent or buy a new place to live, manage money while on the move, and be vigilant about dealing with businesses in an unfamiliar locale. A servicemember’s regular paycheck from Uncle Sam can make them a target for scammers.
Blog Posts Tagged with Data Security
Want something old and something new, all in one? Check out the FTC’s updated “Protecting Personal Information: A Guide for Business.” It’s the same principles that we’ve relied on for years, but with a new twist. You’ll find the latest tips about technologies that have emerged since we last published the guide.
You suspect that your business experienced a data breach. Maybe an employee lost a laptop, or a hacker got into your customer database, or information was inadvertently posted on your website. Whatever happened, you’re probably wondering what to do next.
As the old saying goes, “The job’s not finished until the paperwork is done.” But since the enactment of the FTC’s Disposal Rule, the job’s not finished until the paperwork – in this case, consumer reports or information derived from them – is securely destroyed.
Ransom notes used to come in the form of pasted letters clipped from newspapers. Now datanappers gain entry through a weak spot in a company’s network, lock the business out of its own system, and hold files – including sensitive health or financial information – for ransom. Would you know how to react if your business is the next victim? And are you taking reasonable steps to reduce the risk of that happening?
We’re not being overdramatic when we describe it as a business executive’s nightmare: a shadowy contact from a hacker who has infiltrated a company’s network, encrypted the data, and now demands ransom for a key to access the files.
The Internet of Things refers to consumer products that connect to the Internet to send and receive data – everything from fitness devices, wearables, and smart cars to connected smoke detectors, light bulbs, and refrigerators.
Hog butcher for the world,
Tool maker, stacker of wheat,
Leader in mobile and a national tech hub.
The FCC asked – and we answered. Underway at the Federal Communications Commission is a proposed privacy rulemaking for broadband internet access service providers. The FCC sought public comment on the proposal and the staff of the FTC’s Bureau of Consumer Protection has offered its perspectives.
You want to build data security into your product development pipeline, but what concrete steps should you take to put that into practice? You could sit down over coffee with executives from Fortune 500 companies, innovative start-ups, and leading security firms to download their expertise, but the cost could be substantial in time, access, and caffeine. The FTC has a better idea.
If your business regularly makes wire transfer payments, it could be the next target of a fast-growing scam in which cybercriminals trick employees into transferring large sums of money to them by impersonating CEOs and other company executives in spoofed emails.
Bears and Bulls. Brats and beer. That toddlin’ town. Lots of three-word phrases evoke Chicago. And on June 15, 2016, add Start with Security to the list. That’s when the FTC’s Start with Security roadshow breezes into the Windy City.
If you’re in the process of developing a health-related mobile app, what tools are essential to your success? The answer, according to some entrepreneurs, is innovative code, a great marketing plan, and the number of a take-out that delivers until 2AM. But have you given much thought to legal compliance? A new multi-agency interactive tool may help you determine which federal laws apply to your product.
The FTC hosted its first-ever PrivacyCon event on January 14, 2016, to showcase original research in the area of privacy and security research. With over 300 in-person attendees, 1500 virtual attendees watching via webcast, and many more following PrivacyCon on Twitter, the event was a huge success. Participants presented and discussed original research on important and timely topics such as data security, online tracking, consumer perceptions of privacy, privacy disclosures, big data, and the economics of privacy.
Ransomware, Drones, and Smart TV. That’s a trio you don’t often see together. The FTC will consider the consumer protection implications of those issues at three half-day conferences later this year. We call it the Fall Technology Series, and you’ll want to mark your calendar now.
It’s Red Carpet Season. There isn’t an Academy presenting awards for Two-Minute Videos Most Likely to Help Businesses Start with Security. (The engraving wouldn’t fit on the statuette anyway.) But if there were, submitted for your consideration are our nominees in ten categories – and the debut of a new production.
Best short feature. We’re fans of Start with Security. It explains the basics of building security into the culture of your company.
The router is Grand Central Station for home technology. It manages the connections between all of the smart devices in the home, from the computer in the den and tablet on the coffee table, to the smart thermostat on the wall and internet-connected baby monitor in the nursery. Consumers expect that route to be a limited access highway with the router forwarding data securely while blocking unauthorized access.
British blues rockers Ten Year After had a hit back in the day with “Hear Me Calling.” We doubt they were thinking of the FTC’s ten-year regulatory review schedule – OK, they weren’t – but it’s likely at least one of the four rules up for review this year affects your business. Can you hear us calling and are you ready to weigh in?