Skip to main content
Business Blog

Cybersecurity for small business: Vendor security

Date
Not many small businesses do business these days without the services of third-party vendors, some of whom have access to your company’s sensitive information. Even if you run a tight cybersecurity...
Business Blog

Cybersecurity for small business: Tech support scams

Date
An employee gets a phone call, pop-up, or email warning about a problem with the office computer. In an effort to be helpful – or perhaps concerned they clicked on something that caused the glitch –...
Business Blog

Data security hearings start today: Watch the webcast

Date
Y ou’ve probably been following the FTC Hearings on Competition and Consumer Protection in the 21st Century. The next two days of hearings – Tuesday, December 11th, and Wednesday, December 12th – will...
Business Blog

Cybersecurity for small business: Business email imposters

Date
When cyber crooks send messages trying to trick people into disclosing passwords or account information, they often mimic a recognizable email address to make it look like it’s coming from a trusted...
Business Blog

Everybody comment now?

Date
Willing to wager there’s no plausible connection between 90s dance group C + C Music Factory and the FTC’s just-announced request for public comment about the Red Flags Rule and the Card Issuers Rule...