Blog Posts Tagged with Non-Profits

Pages

Forum on fighting phone bill ills

It may have happened to you.  You open the monthly phone bill at your business or at home and find charges for goods or services you never ordered.  It’s called cramming — and it’s illegal.

The FTC has brought numerous law enforcement actions against companies who “cram” unauthorized charges onto people’s phone bills.  This $38 million judgment entered by a federal court in California is just one example, but what more can be done to prevent it?

Four Steps to Protecting Your Business from Con Artists

You've just opened an invoice for office supplies you didn't order or for a listing in a business directory. It’s the same invoice you got last week – but this one is stamped "Past Due." Perhaps one of your colleagues says there's someone hounding her on the phone, demanding payment for Internet services your business didn’t request. You refuse to pay, and the next thing you know, they're threatening to take you to court, or turn the bill over to a collection agency and ruin your credit.

Data Security: Copi-er That!

If your company keeps sensitive data like Social Security numbers, credit reports, account numbers, health records, or business secrets, you’ve probably instituted safeguards to protect that information, whether it’s stored in computers or on paper. That’s great.  But it’s time to take those safeguards a step further.

Tales From the Unencrypted

Does your business have a wireless network?  Do you or your employees ever use wifi to catch up on work from home?  Think about all the data that could be transmitted over your wireless network – credit card numbers, bank account information, business secrets.  You probably don’t want to share that information with everyone who passes through your neighborhood.  But that’s what you’re doing if you don’t use strong encryption and take other steps to secure your home network.  Someone nearby could “piggyback” on your network, or even access the information on your computer.

On the Road Again

This is National Chemistry Week. It’s also National School Bus Week. And be sure to wish members of Team Jacob a happy National Wolf Awareness Week. But for most business travelers, the annual observance that really hits home – or the road – is National Protect Your Identity Week, October 17th through 23rd.

NetCetera Community Outreach Toolkit

Maybe you work in the tech sector.  Perhaps your firm has clients with a big internet presence.  Or maybe you're responsible for paying attention to how your family uses the computer.  That's why you'll want to know about the Net Cetera Community Outreach Toolkit, a free resource just released by OnGuardOnline.gov.

UN-surance

Many smaller companies want to extend health benefits to employees, but are concerned about keeping the price affordable.  For people who own their own business or are looking for work, cost-effective coverage can be tough to find.  If you’re in the market for health insurance, make sure that’s what you’re buying.  Some programs pitched to small businesses, the self-employed, and the uninsured sound like affordable health insurance, but actually are medical discount plans.  Although some plans may offer legitimate savings, others take people’s money and provide very little in return.

The Dupe of URL

No, not the doowop song by Gene Chandler, but a form of fraud aimed at small businesses and non-profits. Here’s how the scam works: Con artists send fake invoices to businesses, listing the domain name or URL of the company’s website or a slight variation – like substituting ".org" for ".com." The bills, designed to look like they come from a domain name registrar, say the company owes money for its annual "website address listing" and "search optimization" service. Busy entrepreneurs are led to believe they have to pay to keep the company URL up and running.

What's Your P2P Policy?

You’re looking at a website right now, but what else is open on the toolbar at the bottom of your screen? Customer spreadsheets? Financial documents? Confidential memos? What’s the risk that a hacker is looking over your virtual shoulder to steal data that could be used to commit fraud or ID theft? The answer may depend on your company’s policy toward peer-to-peer (P2P) file sharing.

BCP Business Center: Your Link to the Law

Welcome to the BCP Business Center:  Your Link to the Law.  Explore and you’ll find practical compliance guidance on advertising, telemarketing, credit, data security, and other need-to-know topics for business owners and marketing professionals.  What else will you find?  The latest word on upcoming workshops, hot-off-the-presses staff reports, and new compliance videos.  We’ll do our best to keep things to the point with a minimum of ho-hum, a maximum of how-to, and as little yadda yadda yadda as a legal website can manage. 

Pages