Skip to main content
Business Blog

i-Dressup and a data security mess-up

Date
Kids love to play dress-up, but parents wouldn’t want them rummaging through the attic or climbing to the top shelf of the wardrobe without permission and proper supervision. The i-Dressup.com website...
Business Blog

Annual Highlights: A quick run-down of 2018

Date
The FTC focuses most of its time and attention on protecting consumers and promoting competition. Every so often, we stop and take stock. For example, check out our just-released Annual Highlights for...
Business Blog

Selling genetic testing kits? Read on.

Date
If you sell genetic testing kits to consumers, you’re probably familiar with the Genetic Information Nondiscrimination Act (GINA), which prohibits discrimination on the basis of genetic information...
Business Blog

Top frauds of 2018

Date
Every year, millions of consumers tell us – and our partners – about the frauds they spotted. In 2018, we heard from 3 million people and learned a lot from the reports entered into our Consumer...
Business Blog

Cybersecurity for small business: Secure remote access

Date
Punching a time clock in and out isn’t how small businesses run these days. Employees are on the road, others are working from home, vendors are accessing your data at off hours – and you’re...
Business Blog

Cybersecurity for small business: Hiring a web host

Date
Your website is the online face of your business. Some companies have the in-house capability to manage their web presence. Others hire a web host to handle it for them. When launching a new business...
Business Blog

Cybersecurity for small business: Email authentication

Date
As a business person, you know about phishing, of course. At first glance, the email looks like it comes from a recognized company, complete with a familiar logo, slogan, and URL. But it’s really from...
Business Blog

Cybersecurity for small business: Vendor security

Date
Not many small businesses do business these days without the services of third-party vendors, some of whom have access to your company’s sensitive information. Even if you run a tight cybersecurity...
Business Blog

Cybersecurity for small business: Tech support scams

Date
An employee gets a phone call, pop-up, or email warning about a problem with the office computer. In an effort to be helpful – or perhaps concerned they clicked on something that caused the glitch –...