Data security should be a top business priority. But what exactly does that type of security entail?

In today’s fast-paced world, where technology changes constantly and hackers are finding new ways to steal personal information, it’s important for businesses to stay a step ahead.

The FTC released two documents to help businesses understand the basic principles of protecting personal information, and best practices to follow. One, Protecting Personal Information: A Guide for Business, outlines the five basic principles of data security. It provides information to help safeguard personal information that is a part of doing business.

The other white paper, Start with Security, uses lessons learned from actual law enforcement cases to provide examples and show best practices for businesses to follow. Using more than 50 law enforcement actions announced by the FTC, these settlements are compiled into ten lessons that help other businesses protect themselves from cyber attacks.

Download your free copy of these white papers here.

Request Your Free Copy



Protecting Personal Information: A Guide for Business- Summary: Most companies keep sensitive personal information in a database that identifies customers or employees.This information often is necessary to fill orders, meet payroll, or perform other necessary business functions. However, if sensitive data falls into the wrong hands, it can lead to fraud, identity theft or other harmful activities. Therefore, safeguarding personal information is part of any  good business plan, for the company’s reputation and to protect your customers. The five basic principles of data security outlined in this brochure will go a long way toward helping you keep data secure.

Start with Security- Summary: In this paper, learn from the more than 50 law enforcement actions the FTC has announced so far. These are settlements – no findings have been made by a court – and the specifics of the orders apply just to those companies, but learning about alleged lapses and the consequences can help your company improve its practices. Distilling the facts of those cases down to their essence, the paper presents ten lessons that touch on vulnerabilities that could affect your company, along with practical guidance on how to reduce the risks they pose.