Skip to main content
Business Blog

Showcase your research at PrivacyCon 2020

Date
How would we describe PrivacyCon 2020 ? Is it Burning Man without the flames? The New Orleans Jazz Festival – minus the jazz and the festival? The best way to know what PrivacyCon is all about is to...
Business Blog

SMB Cybersecurity Survey: It’s yours for the taking

Date
Wondering what small and midsize businesses (SMBs) think about cybersecurity? Or maybe you work for a small or midsize business that would like to tell someone what you think. Here’s your chance. The...
Business Blog

All aboard for Atlanta

Date
According to musical legend, a buddy of songwriter Jim Weatherly commented that his girlfriend was leaving on the “midnight plane to Houston.” The buddy was Lee Majors of Six Million Dollar Man fame...
Business Blog

PrivacyCon: Watch the webcast

Date
The stars are aligning – the privacy and security stars, that is. The FTC’s fourth PrivacyCon convenes today, June 27, 2019. Experts from around the globe will discuss their latest research into...
Business Blog

PrivacyCon’s All-Star line-up

Date
I n just a few years, the FTC’s PrivacyCon has become an Information All-Star Game, complete with panels as high-flying or power-hitting as the Slam Dunk Contest or Home Run Derby. (OK. High-flying...
Business Blog

i-Dressup and a data security mess-up

Date
Kids love to play dress-up, but parents wouldn’t want them rummaging through the attic or climbing to the top shelf of the wardrobe without permission and proper supervision. The i-Dressup.com website...
Business Blog

Selling genetic testing kits? Read on.

Date
If you sell genetic testing kits to consumers, you’re probably familiar with the Genetic Information Nondiscrimination Act (GINA), which prohibits discrimination on the basis of genetic information...
Business Blog

Cybersecurity for small business: Secure remote access

Date
Punching a time clock in and out isn’t how small businesses run these days. Employees are on the road, others are working from home, vendors are accessing your data at off hours – and you’re...
Business Blog

Cybersecurity for small business: Hiring a web host

Date
Your website is the online face of your business. Some companies have the in-house capability to manage their web presence. Others hire a web host to handle it for them. When launching a new business...
Business Blog

Cybersecurity for small business: Email authentication

Date
As a business person, you know about phishing, of course. At first glance, the email looks like it comes from a recognized company, complete with a familiar logo, slogan, and URL. But it’s really from...