FTC’s “Stick With Security” #6: Protect Remote Access To Your Network

On September 1, 2017, the FTC released its sixth “Stick with Security” principle, which highlighted the steps businesses can take to ensure that “outside entryways” into network systems are secure. Securing remote access to a network involves two aspects: Ensure … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article:

FTC’s “Stick With Security” #5: Segment Your Network And Monitor Who’s Trying To Get In And Out

On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the kind of attention businesses … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article:

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept.  To that end, an essential security tool … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article:

FTC’s “Stick With Security” #3: Require Secure Passwords and Authentication

On August 11, 2017, the FTC released its third “Stick with Security” principle, which touched on the necessity of strong authentication practices. Secure passwords and fortified authentication practices make it that much harder for hackers to “bluff” their way into … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article:

FTC’s “Stick With Security” #2: Control Access to Data Sensibly

On August 4, 2017, the FTC released its second “Stick with Security” principle, which addressed the next step a company should take after it has identified confidential data in its possession and determined what information it needs to maintain for … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article:

“Stick With Security” – Getting Up to Speed With the FTC’s New Initiative

Companies that have experienced data breaches or security hacks have subsequently found themselves the subject of enforcement actions by the Federal Trade Commission (“FTC”) for violating the FTC Act, due to inadequate protections and provisions that should have been in … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article:

New Mexico’s Data Breach Law

Almost all U.S states have laws about data security and what to do when there’s a data breach. New Mexico recently added such a law for its state. Here is what’s in the New Mexico law. Who The Law Applies … Continue reading

Posted in Data Breach, Government Regulations, New Mexico

Share this Article:

New Cybersecurity Rules for Colorado Investment Advisers and Broker-Dealers

Colorado has adopted new rules that add cybersecurity requirements for certain entities with Colorado securities licenses. The rules are from the regulatory agency the Division of Securities. It licenses securities professionals and helps maintain confidence in the securities market. Its … Continue reading

Posted in Colorado, Cyber Security, Government Regulations

Share this Article:

WannaCry: What to Know and What to Do

On Friday, May 12, 2017, a malicious ransomware program known as WannaCry was discovered infecting computer systems all over the world.  It set off alarms globally, and so far has infected over 200,000 computers across more than 150 countries.  Victims include Deutsche … Continue reading

Posted in Cyber Security, FBI, Malware, NSA, Ransomware

Share this Article:

WannaCry Ransomware Attack – A Really Quick Primer

Over the past week, computers all over the world have fallen victim to a ransomware attack known as “WannaCry”.  The WannaCry malware reportedly utilizes sophisticated hacking tools that were leaked from the National Security Agency earlier this year.  It exploits … Continue reading

Posted in Cyber Security, Malware, Ransomware

Share this Article: