As a business person, you know that accessing the public Wi-Fi network in an airport lounge, coffee shop, or other location can be risky. Public networks aren’t very secure – or, well, private – and it could be easy for others to intercept your confidential business or personal data. But there are times when every executive has to be out and about. So what can you do to keep your mobile data private and secure? Some people use Virtual Private Network (VPN) apps to shield traffic from their mobile devices from prying eyes on public networks.
Blog Posts Tagged with Tech
Engage, connect, protect was the theme of a series of Small Business Security Roundtables the FTC sponsored last summer. We listened to businesses talk about the challenges they face in securing sensitive information and fending off cyber threats. We also heard that they want concrete advice from the FTC. For example, how can a small company – especially one that may not have the in-house expertise to host its own website – get down to business while also addressing these concerns?
Blind Faith, Crosby Stills Nash & Young, Humble Pie, the Traveling Wilburys. Every musical genre has its supergroup, individual talents from other groups who come together to create something even more impressive. In the consumer privacy and data security world, we think the agenda for the FTC’s PrivacyCon 2018 reads like the line-up of one of those legendary supergroups. (Minus Eric Clapton – sorry.)
So you’ve received a Civil Investigative Demand (CID) from the Federal Trade Commission related to a consumer protection matter. Now what? We appreciate that it can be daunting for any company – especially a small business – and we want to be as transparent as possible about the process.
For college students building their resumes, that camp counselor gig is nice – but what about participating in a session at an international conference of privacy and data security experts?
The Wizard of Oz was right: “Pay no attention to the man behind the curtain.” That’s because according to an FTC settlement, computer company Lenovo should have been paying attention to the “man in the middle.” In this case, the “man in the middle” was preloaded ad-injecting software that put consumers’ personal information at risk from harmful man-in-the-middle attacks.
Internet of Things entrepreneurs are developing products to help keep households running smoothly. But like anyone else you invite into your home, it’s important that IoT devices – appliances, fitness monitors, home security systems, etc. – behave like good houseguests. Out-of-date software can pose a particular problem. One IoT device without software updates can present its own security risks, of course, but it also can introduce vulnerabilities elsewhere on the home network.
With schedules changing as frequently as they do, we can’t be sure what’s on tap for tomorrow. But we already know where we’ll be on Wednesday, February 28, 2018. We’ll be at the FTC’s third PrivacyCon – a gathering of researchers, academics, industry members, consumer advocates, and government representatives talking about the privacy and security implications of emerging technologies.
Here’s the story of a database of sensitive consumer information – names, addresses, phone numbers, email, and payment information – posted on a site frequented by (among others) hackers. It took just minutes before identity thieves tried to make unauthorized use of the information. But this tale of stolen credentials is full of surprises, including who posted the data.
It’s the thread that connects Alexandre Dumas’ The Man in the Iron Mask, the title character in The Talented Mr. Ripley, Don Draper’s back story in Mad Men – and an event scheduled for May 24, 2017, at the FTC.
It’s identity theft.
It’s wise to maintain a reasonable speed: 1) when you’re behind the wheel; or 2) when you’re preparing your public comments for the June 28, 2017, workshop on connected cars hosted by the FTC and the National Highway Traffic Safety Administration. That’s why we’re extending the deadline for your feedback to Monday, May 1st.
The scene is the west coast, the subject is emerging technology, and AI is in the title. But it’s not the 2001 Spielberg sci fi film.
Financial technology remains a hot topic for consumers, offering the possibilities of increased convenience and access to financial services at a lower cost. As part of its FinTech Forum series, the FTC continues to promote public discussion of the ways in which innovative FinTech services – many provided by non-banks and technology companies within the FTC’s jurisdiction – can benefit consumers and the potential issues for stakeholders to keep in mind.
Consumers have bought more than 11 million internet-connected Vizio televisions since 2010. But according to a complaint filed by the FTC and the New Jersey Attorney General, consumers didn’t know that while they were watching their TVs, Vizio was watching them. The lawsuit challenges the company’s tracking practices and offers insights into how established consumer protection principles apply to smart technology.
We recently saw a fellow diner reach across the cafeteria soup station until splat! His phone fell out of his shirt pocket and into the minestrone. But even before he ladled out his soup-logged smartphone, he reached into his bag and took out his tablet. As consumers have come to rely on multiple devices, companies are using technologies to connect a consumer’s activity across those devices – smartphones, tablets, desktops, laptops, and more.
What’s that sound? It’s the buzz of the crowd gathering this morning for the FTC’s second PrivacyCon. Leaders from academia, advocacy groups, and industry have convened for a day devoted to the latest research and trends about consumer privacy and data security.
Thanks to the Internet of Things, consumers can easily share a photo with family or watch from the office what’s going on at home. But share a tax return with a hacker, have some creep silently gaze at the live feed from your family room, or have your personal conversations remotely recorded?
It’s a challenge worthy of Drs. Peter Venkman, Egon Spengler, and Ray Stantz – and it could result in a prize of as much as $25,000 for a creative tech tinkerer.
So you’ve taken every precaution against a zombie attack. You’ve sealed the windows, stockpiled kerosene, and keep a machete or two handy. But despite your best efforts, The Undead still manage to reanimate themselves and stalk their unsuspecting prey. We hate when that happens. But this time it’s not an episode of The Walking Dead.