Â鶹´«Ã½

Skip to main content
Business Blog

Selling genetic testing kits? Read on.

Date
If you sell genetic testing kits to consumers, you’re probably familiar with the Genetic Information Nondiscrimination Act (GINA), which prohibits discrimination on the basis of genetic information...
Business Blog

Cybersecurity for small business: Secure remote access

Date
Punching a time clock in and out isn’t how small businesses run these days. Employees are on the road, others are working from home, vendors are accessing your data at off hours – and you’re...
Business Blog

Cybersecurity for small business: Hiring a web host

Date
Your website is the online face of your business. Some companies have the in-house capability to manage their web presence. Others hire a web host to handle it for them. When launching a new business...
Business Blog

Cybersecurity for small business: Email authentication

Date
As a business person, you know about phishing, of course. At first glance, the email looks like it comes from a recognized company, complete with a familiar logo, slogan, and URL. But it’s really from...
Business Blog

Cybersecurity for small business: Vendor security

Date
Not many small businesses do business these days without the services of third-party vendors, some of whom have access to your company’s sensitive information. Even if you run a tight cybersecurity...
Business Blog

Cybersecurity for small business: Tech support scams

Date
An employee gets a phone call, pop-up, or email warning about a problem with the office computer. In an effort to be helpful – or perhaps concerned they clicked on something that caused the glitch –...
Business Blog

Data security hearings start today: Watch the webcast

Date
You’ve probably been following the FTC Hearings on Competition and Consumer Protection in the 21st Century. The next two days of hearings – Tuesday, December 11th, and Wednesday, December 12th – will...
Business Blog

Cybersecurity for small business: Business email imposters

Date
When cyber crooks send messages trying to trick people into disclosing passwords or account information, they often mimic a recognizable email address to make it look like it’s coming from a trusted...
Business Blog

Everybody comment now?

Date
Willing to wager there’s no plausible connection between 90s dance group C + C Music Factory and the FTC’s just-announced request for public comment about the Red Flags Rule and the Card Issuers Rule...
Business Blog

Cybersecurity for small business: Phishing

Date
Phishing scammers have gotten more sophisticated. They still send out mass emails asking consumers for credit card numbers or bank account information. But they’re also targeting small businesses by...
Business Blog

Cybersecurity for small business: Ransomware

Date
Mention the word “ransomware†at a meeting of small business owners and you’ll feel the temperature in the room drop by 20 degrees. A ransomware attack is a chilling prospect that could freeze you out...
Business Blog

Cybersecurity for small business: Physical security

Date
An employee catches up on some work while visiting the local coffee shop. She grabs her Double Mocha to go, but accidentally leaves behind a flash drive with hundreds of Social Security numbers on it...
Business Blog

Cybersecurity for small business: Cybersecurity basics

Date
As a small business owner, you know that cyber criminals will steal data any place they can find it, whether it’s from a global giant or a Main Street store. So where can you find just-the-facts...
Business Blog

PrivacyCon 2019: Mark your calendar

Date
Take out your scheduler now and block out Thursday, June 27, 2019. That’s the date of the FTC’s fourth annual PrivacyCon and you’ll want to be in on the action. PrivacyCon brings together...