Tag: Non-Profits

Displaying 1 - 20 of 73 results.

Pages

Filtering by content type: Blog Post

It typically started with a schmoozy call to an unsuspecting small business or nonprofit. Sometimes the caller claimed to be “confirming” an existing order, “verifying” an address, or offering a “free” catalog or sample. Then came the supplies surprise – unordered merchandise arriving...
When scammers and hackers attack small businesses, it hurts not only the businesses’ reputations and bottom line, but also the integrity of the marketplace. Today, FTC Acting Chairman Maureen Ohlhausen announced a new FTC website, FTC.gov/SmallBusiness, to help business owners avoid...
Scammers try to contact people in many ways. They call, email, put ads online, send messages on social media and more. If you own a small business, they’re trying to contact you, too. 
There’s an upcoming gotta-be-there trade show for your industry. Your company gets a form in the mail from a P.O. box in the Chicago area asking to confirm your address for a trade show listing. You or a staffer signs without giving it a second thought – until you get the surprise of...
Spoiler alert: If the villains in a thriller appear to be vanquished with 20 minutes left in the movie, you can bet they’ll make a dramatic reappearance. A case filed by the FTC targets a B2B tactic that small businesses started seeing years ago, but – to quote Poltergeist II – “They’...
You’ve got lots of needs as a business owner – among them, supplies you rely on from square-dealing vendors. But what if the vendor misleads your staff about the price or quantity of those supplies, hits you with a huge invoice you didn’t authorize, and then tries to pressure you into...
Why is it your business if identity theft victims can get free personal recovery plans and other help that makes it easier for them to report and recover from identity theft?  Here’s an answer: Because it’s good business – for you, your customers, your employees, and your community...
A small business or nonprofit gets what appears to be an invoice for a listing in an online yellow pages directory. On the face of it, it looks legit. It includes the name of an employee at the office, a copy of what the listing looks like, the “walking fingers” symbol associated with...
Here’s a tip for business travelers. Just because a webpage looks like the official site of your favorite hotel chain doesn’t necessarily mean it is. Before you reserve a room for your next out-of-town meeting or family vacation, make sure you know who’s at the other end of that BOOK...
A natural disaster can wreak havoc on any business. But it’s even worse when that real-world catastrophe becomes a data security calamity.Before the summer storm season arrives, get your business ready. Just like you gather flashlights, bottled water, and emergency supplies, you can...
Caribbean cruises, jet ski outings, trips to Disneyworld, tickets to sporting events and concerts, and even dating service subscriptions. You’d expect to see that on reruns of “Lifestyles of the Rich and Famous.” What you wouldn’t expect is that they were paid for by donations people...
What do mystery writers, magicians, and some small business scammers have in common? The art of misdirection. But when it comes to small business scammers, we’re on to their tricks. Today the FTC announced that, at its request, a federal court stopped yellow page scammers that were...
53 and it’s likely to go up. That’s the number of data security law enforcement actions the FTC has settled so far. The facts of each case are different, but distilled down to the basics, they stand for one central proposition: Your company’s data security measures should be...

Filtering by content type: Plain Language Guidance

Here are a few computer security basics to help your company, even if you’re the only employee. If you have employees, train them to follow these tips. If you collect any consumer information, also check out our advice about protecting personal information.PROTECT YOUR FILES &...
Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees. This information often is necessary to fill orders, meet payroll, or perform other necessary business functions...
When managing your network, developing an app, or even organizing paper files, sound security is no accident. Companies that consider security from the start assess their options and make reasonable choices based on the nature of their business and the sensitivity of the information...
La estafa de la guía comercial El embuste de los artículos de oficina La chanchullo del URL La trampa de la donación de caridad El engaño del cheque ¿Qué puedo hacer para proteger a mi negocio?

Filtering by content type: Press Release

In testimony before Congress today, the Federal Trade Commission presented its views on 17 bills Congress is currently considering with respect to the agency’s jurisdiction and operations.

Filtering by content type: Case

Pages