Lessons from Federal Trade Commission cases
Go to the FTC Start with Security website here or click here to download a PDF copy of their full recommendations.
When managing your network, developing an app, or even organizing paper files, sound security is no accident. Companies that consider security from the start assess their options and make reasonable choices based on the nature of their business and the sensitivity of the information involved. Threats to data may transform over time, but the fundamentals of sound security remain constant. As the Federal Trade Commission outlined in Protecting Personal Information: A Guide for Business, you should know what personal information you have in your files and on your computers, and keep only what you need for your business. You should protect the information that you keep, and properly dispose of what you no longer need. And, of course, you should create a plan to respond to security incidents.
There’s another source of information about keeping sensitive data secure: the lessons learned from the more than 50 law enforcement actions the FTC has announced so far. These are settlements – no findings have been made by a court – and the specifics of the orders apply just to those companies, of course. But learning about alleged lapses that led to law enforcement can help your company improve its practices. And most of these alleged practices involve basic, fundamental security missteps. Distilling the facts of those cases down to their essence, here are ten lessons to learn that touch on vulnerabilities that could affect your company, along with practical guidance on how to reduce the risks they pose.
- Start with security.
- Control access to data sensibly.
- Require secure passwords and authentication.
- Store sensitive personal information securely and protect it during transmission.
- Segment your network and monitor who’s trying to get in and out.
- Secure remote access to your network.
- Apply sound security practices when developing new products.
- Make sure your service providers implement reasonable security measures.
- Put procedures in place to keep your security current and address vulnerabilities that may arise.
- Secure paper, physical media, and devices.




![Bernard Picart [Public domain], The Sounding of the Shofar on Rosh Hashanah, illustration circa 1733–1739 by Bernard Picart from](https://upload.wikimedia.org/wikipedia/commons/9/95/Picart_The_Sounding_of_the_Shofar_on_Rosh_Hashanah.jpg)
 A recent federal bulletin urged state and local law enforcement to be on high alert ahead of 9/11 anniversary. It explained that that terrorists – specifically those aligned with
A recent federal bulletin urged state and local law enforcement to be on high alert ahead of 9/11 anniversary. It explained that that terrorists – specifically those aligned with

 schools and congregations, and more have received a combined total of $5,172,143 for the 2016 fiscal year as Urban Areas Security Initiative (UASI) Nonprofit Security Grant Program (NSGP) Awardees. The program, run by the Federal Emergency Management Agency (FEMA), awards federal funds to nonprofit organizations that are at a high risk of a national terrorist attack to encourage preparedness efforts.
 schools and congregations, and more have received a combined total of $5,172,143 for the 2016 fiscal year as Urban Areas Security Initiative (UASI) Nonprofit Security Grant Program (NSGP) Awardees. The program, run by the Federal Emergency Management Agency (FEMA), awards federal funds to nonprofit organizations that are at a high risk of a national terrorist attack to encourage preparedness efforts.
