Â鶹´«Ã½

Skip to main content
Business Blog

PrivacyCon: Watch the webcast

Date
The stars are aligning – the privacy and security stars, that is. The FTC’s fourth PrivacyCon convenes today, June 27, 2019. Experts from around the globe will discuss their latest research into...
Business Blog

PrivacyCon’s All-Star line-up

Date
In just a few years, the FTC’s PrivacyCon has become an Information All-Star Game, complete with panels as high-flying or power-hitting as the Slam Dunk Contest or Home Run Derby. (OK. High-flying and...
Business Blog

i-Dressup and a data security mess-up

Date
Kids love to play dress-up, but parents wouldn’t want them rummaging through the attic or climbing to the top shelf of the wardrobe without permission and proper supervision. The i-Dressup.com website...
Business Blog

Annual Highlights: A quick run-down of 2018

Date
The FTC focuses most of its time and attention on protecting consumers and promoting competition. Every so often, we stop and take stock. For example, check out our just-released Annual Highlights for...
Business Blog

Selling genetic testing kits? Read on.

Date
If you sell genetic testing kits to consumers, you’re probably familiar with the Genetic Information Nondiscrimination Act (GINA), which prohibits discrimination on the basis of genetic information...
Business Blog

Top frauds of 2018

Date
Every year, millions of consumers tell us – and our partners – about the frauds they spotted. In 2018, we heard from 3 million people and learned a lot from the reports entered into our Consumer...
Business Blog

Cybersecurity for small business: Secure remote access

Date
Punching a time clock in and out isn’t how small businesses run these days. Employees are on the road, others are working from home, vendors are accessing your data at off hours – and you’re...
Business Blog

Cybersecurity for small business: Hiring a web host

Date
Your website is the online face of your business. Some companies have the in-house capability to manage their web presence. Others hire a web host to handle it for them. When launching a new business...
Business Blog

Cybersecurity for small business: Email authentication

Date
As a business person, you know about phishing, of course. At first glance, the email looks like it comes from a recognized company, complete with a familiar logo, slogan, and URL. But it’s really from...