Business Blog

Pages

Cybersecurity for small business: Vendor security

Not many small businesses do business these days without the services of third-party vendors, some of whom have access to your company’s sensitive information. Even if you run a tight cybersecurity ship, what happens if your accountant loses a laptop or the payroll company that connects to your network experiences a security breach? Your business could be in jeopardy, of course, but that’s not all.

Cybersecurity for small business: Tech support scams

An employee gets a phone call, pop-up, or email warning about a problem with the office computer. In an effort to be helpful – or perhaps concerned they clicked on something that caused the glitch – the employee follows instructions to send money, turn over personal information, or provide access to your system. As a small business owner, you know it’s a tech support scam, but are you sure every member of your team has the savvy to spot it?

Cybersecurity for small business: Business email imposters

When cyber crooks send messages trying to trick people into disclosing passwords or account information, they often mimic a recognizable email address to make it look like it’s coming from a trusted source – for example, from your company. It’s a practice called spoofing and it packs a double wallop. Not only does it put consumers at risk for identity theft, but spoofing can unfairly damage the reputation for trust you’ve worked hard to earn.

Endorsement enforcement: Deceptive diabetes claims challenged

Archeologists report that the first mention of diabetes was in a papyrus excavated from an Egyptian tomb. Roll the scroll out a bit and it wouldn’t surprise us to find an ad (in hieroglyphics, of course) for a pill or potion promising a miracle treatment. Questionable diabetes products have been around for centuries and the latest one to attract law enforcement attention is a dietary supplement called Nobetes.

Talking turkey

Whether it’s a spare can of cranberry sauce or an extra turkey platter, thoughtful Thanksgiving hosts make contingency plans for the holiday. This year, if the dinner discussion veers into controversial territory – like the pumpkin pie vs. pecan pie debate – here’s a suggested topic of conversation you can have at the ready.

FTC’s Comment on the future of privacy

As the only federal agency with a dual mission to protect consumers and promote competition, the FTC is uniquely situated to comment on the future of privacy policymaking in the United States. So we welcomed the opportunity to respond to the Department of Commerce, National Telecommunications and Information Administration (NTIA) Request for Comment on “Developing the Administration’s Approach to Consumer Privacy.”

Cybersecurity for small business: Ransomware

Mention the word “ransomware” at a meeting of small business owners and you’ll feel the temperature in the room drop by 20 degrees. A ransomware attack is a chilling prospect that could freeze you out of the files you need to run your business. When FTC staff met with business owners across the country, you cited ransomware as a particular concern. New resources from the FTC can help protect your company from this threat.

Planning a social media marketing campaign? Read this first.

It started as one of those “run it up the flagpole” ideas to enlist big-name gymnasts to promote a brand of mosquito repellent just as news stories about the 2016 Brazil Olympics were sounding warnings about the Zika virus. Public relations firm Creaxion Corporation and specialty sports magazine publisher Inside Publications used a variety of digital strategies on behalf of the brand: athlete endorsements, social media posts, “advertorials,” and consumer reviews.

Cybersecurity for small business: Physical security

An employee catches up on some work while visiting the local coffee shop. She grabs her Double Mocha to go, but accidentally leaves behind a flash drive with hundreds of Social Security numbers on it. When she returns, the flash drive is gone. Then there’s the staff member who needs to free up file room space. After he tosses a stack of old company bank records into the garbage, a dumpster diver spots the trash and walks away with a windfall.

Telegram to MoneyGram: Stop fraud. And pay up. Again.

If you run a business that offers people a way to send money to other people, you may want to pay attention to whether your service is catering to fraudsters. It’s an important message because, for many years, money transfers have been a preferred payment method for scammers, who know that they can pick up the cash and disappear. And it’s a message some companies apparently need to hear twice.

FTC challenges massive overseas real estate investment operation harming American consumers

Based on the promoters’ promises, it sounded like a tropical paradise: a luxury enclave called Sanctuary Belize featuring a championship golf course, a new airport with direct flights to the U.S., and a hospital staffed with American doctors. No wonder consumers – many of whom were contemplating retirement – sunk more than $100 million of their savings into lots in what appeared to be a swanky resort development already under construction.

Do you have a 2012, 2013, or 2014 VW Passat TDI?

If you have a 2012, 2013, or 2014 Passat 2.0L TDI and got the approved emissions modification, Volkswagen has identified a potential problem with the “fix” it installed on your car that needs your immediate attention. If you have one of those vehicles but haven’t gotten the modification, you must make an important decision very soon. You’ll be getting a detailed letter in the mail from VW about this, but in the meantime, here are some key facts.

Cybersecurity for small business: Understanding the NIST Cybersecurity Framework

The FTC hosted roundtables across the country asking small business owners how we can help you address the challenges of cybersecurity. Based on your feedback, we designed to-the-point tips now available at ftc.gov/cybersecurity. Last week we kicked off a 12-part every-Friday Business Blog series with cybersecurity basics.

Pages