Blog Posts Tagged with Data Security

Pages

FTC takes action against stalking apps

You know that eerie feeling that someone is following your every move? If someone secretly installed a “stalking app” or “stalkerware” sold by Retina-X Studios, LLC, onto your mobile device, that strange sensation could be way more than a feeling. A complaint against the developer and marketer alleges violations of the FTC Act and the Children’s Online Privacy Protection Act Rule.

Charity fraud awareness, here & abroad: How businesses can help charities defend against cyber threats

It’s International Charity Fraud Awareness Week, a global effort to help charities and donors avoid charity fraud. The FTC has united with state charities regulators, the National Association of State Charities Officials, and international partners in the campaign. By joining forces, we can reach more charities with information and advice. This year, the focus is on what charities can do to help defend against cyber threats.

Showcase your research at PrivacyCon 2020

How would we describe PrivacyCon 2020? Is it Burning Man without the flames? The New Orleans Jazz Festival – minus the jazz and the festival? The best way to know what PrivacyCon is all about is to mark your calendar for July 21, 2020, and attend the FTC’s fifth annual gathering of leading privacy researchers. And check out our Call for Presentations to see if PrivacyCon would be a good forum for your recent research.

SMB Cybersecurity Survey: It’s yours for the taking

Wondering what small and midsize businesses (SMBs) think about cybersecurity? Or maybe you work for a small or midsize business that would like to tell someone what you think. Here’s your chance. The Information Technology Sector Coordinating Council (IT SCC) and Department of Homeland Security (DHS) just released a voluntary survey about SMB cybersecurity practices – and they asked us to help get the word out.

All aboard for Atlanta

According to musical legend, a buddy of songwriter Jim Weatherly commented that his girlfriend was leaving on the “midnight plane to Houston.” The buddy was Lee Majors of Six Million Dollar Man fame and his girlfriend (and later wife) was actress Farrah Fawcett. Mr. Weatherly filed the phrase away and later used it as inspiration for his megahit, Midnight Train to Georgia.

$575 million Equifax settlement illustrates security basics for your business

Patch your software. Segment your network. Monitor for intruders. According to tech experts, those are security basics for businesses of any size. But when you’re industry giant Equifax – a company in possession of staggering amounts of highly confidential information about more than 200 million Americans – it’s almost unthinkable not to implement those fundamental protections.

D-Link settlement: Internet of Things depends on secure software development

The FTC has been keeping a close watch on the Internet of Things since the Internet of Things became a thing to watch. That includes law enforcement actions against companies alleged to have sold vulnerable connected devices that put consumers’ sensitive information at risk. Affected devices could even become – in effect – zombies that do the bidding of malicious botnets that threaten the Internet.

PrivacyCon: Watch the webcast

The stars are aligning – the privacy and security stars, that is. The FTC’s fourth PrivacyCon convenes today, June 27, 2019. Experts from around the globe will discuss their latest research into privacy and data security, and the consumer protection implications of their findings. Minutes before FTC Chairman Simons convenes PrivacyCon at 9:15 ET this morning, visit the event page to watch the webcast live. Join the discussion on Twitter, using the hashtag #PrivacyCon19.

 

PrivacyCon’s All-Star line-up

In just a few years, the FTC’s PrivacyCon has become an Information All-Star Game, complete with panels as high-flying or power-hitting as the Slam Dunk Contest or Home Run Derby. (OK. High-flying and power-hitting if you’re a researcher, academic, or advocate interested in data security and consumer privacy.) The FTC just announced the agenda for the fourth annual PrivacyCon on June 27, 2019. Consult your calendar and save the date.

Data security settlement with service provider includes updated order provisions

The domino principle. The ripple effect. The butterfly phenomenon. Apply the analogy of your choice to describe what happens when one software developer’s allegedly lax security practices result in the breach of confidential customer information maintained by multiple businesses that use the software.

This National Small Business Week, the focus is on cybersecurity

It’s National Small Business Week, a time when we celebrate the businesses that make our communities thrive. For the FTC, it’s an opportunity to let business owners know that when it comes to protecting your business from cyber threats, you’re not alone. The federal government has resources to help you address common cyber threats and create a culture of cybersecurity at your company. The materials at FTC.gov/Cybersecurity were introduced last year in cooperation with DHS, NIST, and the SBA.

i-Dressup and a data security mess-up

Kids love to play dress-up, but parents wouldn’t want them rummaging through the attic or climbing to the top shelf of the wardrobe without permission and proper supervision. The i-Dressup.com website offered users – including children – a virtual way to play dress-up and design clothes without those potential dangers.

Safeguard your network and customer credentials: Tips from the latest FTC data security case

Suppose a lunch companion says, “I think there’s something wrong with this tuna salad.” To determine if the problem is tuna not to their taste vs. tuna gone bad, would you scarf it down? Probably not. Now remove tuna salad from the example and substitute a web browser extension. (Stay with us here.) Let’s say you’ve been warned that an unknown extension could be used for fraud. Should you download it and let it marinate in your company’s network?

Selling genetic testing kits? Read on.

If you sell genetic testing kits to consumers, you’re probably familiar with the Genetic Information Nondiscrimination Act (GINA), which prohibits discrimination on the basis of genetic information under some circumstances. You’re also familiar with the Health Insurance Portability and Accountability Act (HIPAA), which protects health information collected by certain types of entities. Then there are laws enforced by the FDA and the Centers for Disease Control and Prevention that pertain to genetic testing kits.

FTC’s 2018 Privacy & Data Security Update: What it means for your business

Looking to take a deep dive into the breadth and depth of the FTC’s approach to consumer privacy and data security in the past year? The FTC’s website, including the Business Center, has what you need. But what if you or your clients prefer an at-your-fingertips digest of developments in 2018? We’re got that covered, too.

Cybersecurity for small business: Four ways to continue the conversation

When it came to designing the FTC’s Cybersecurity for Small Business campaign, you called the shots. We hosted round tables across the country and listened to what business owners had to say. You told us you wanted: 1) No-nonsense advice that’s easy to implement; and 2) Consistent guidance from the different federal agencies that deal with cyber threats and data security.

Cybersecurity for small business: Secure remote access

Punching a time clock in and out isn’t how small businesses run these days. Employees are on the road, others are working from home, vendors are accessing your data at off hours – and you’re generating ideas 24/7. How do you maintain high security standards when employees and others may need to connect to your network remotely from a variety of devices? When we met with small business owners across the country, that question came up a lot.

Cybersecurity for small business: Hiring a web host

Your website is the online face of your business. Some companies have the in-house capability to manage their web presence. Others hire a web host to handle it for them. When launching a new business or upgrading their site, savvy business owners comparison shop for web hosting services. At the top of your shopping list should be the security features built into what you’re buying.

Pages