Education Department backs off plan to seize Social Security on defaulted loans

Consumer advocates had warned the plan would push many Americans into poverty By James R. Hood…

PAGA Paraphrased – Osuna v. Spectrum Security Services, Inc.

By: Phillip J. Ebsworth and Jeff A. Nordlander Seyfarth Synopsis: The Second District Court of Appeal…

Best email services for security and privacy

Not all email providers are created equal By Dieter Holger of ConsumerAffairs May 27, 2025 The…

FTC Finalizes Order with GoDaddy over Data Security Failures

The Federal Trade Commission has finalized an order with GoDaddy settling allegations that the webhosting provider…

Default lines: How the FTC says Credit Karma and Fandango SSLighted security settings

Imagine a burly doorman at an exclusive party.  When someone claims to be a guest, the…

At Social Security, These Are the Days of the Living Dead

Rennie Glasgow, who has served 15 years at the Social Security Administration, is seeing something new…

Ashley Madison settles with FTC over data security

If you care about data security and privacy, you’ll want to read about the FTC’s settlement…

Trump Administration Retreats From 100% Withholding on Social Security Clawbacks

The Social Security Administration is backing off a plan it announced in March to withhold 100%…

Letter to Morgan Stanley offers security insights about insiders

Businesses are understandably concerned about the threat that hackers pose to the security of sensitive data…

$575 million Equifax settlement illustrates security basics for your business

Patch your software. Segment your network. Monitor for intruders. According to tech experts, those are security…

Data security settlement with service provider includes updated order provisions

The domino principle. The ripple effect. The butterfly phenomenon. Apply the analogy of your choice to…

Stick with Security: Secure paper, physical media, and devices

High-profile hackers grab the headlines. But some data thieves prefer old school methods – rifling through…

Stick with Security: Put procedures in place to keep your security current and address vulnerabilities that may arise

“Sound data security is a process, not a checklist.” We’ve all heard that slogan – and…

Stick with Security: Require secure passwords and authentication

To make it harder for hackers to bluff their way onto a computer network, careful companies…

Start with security – and stick with it

When it comes to data security, what’s reasonable will depend on the size and nature of…

FTC says Uber took a wrong turn with misleading privacy, security promises

How much information does Uber have about its riders and drivers? A lot. The FTC just…

Corporate boards: Don’t underestimate your role in data security oversight

For businesses in the middle of a global pandemic, there’s no such thing as “business as…

Stick with Security: FTC resources for your business

In our Stick with Security blog series, we’ve done our best to dive deeper into data…

Seemingly urgent security messages could lead to tech support scams

You’re online and get a message or pop-up alerting you to a problem with your computer.…

New Social Security claims rules took effect today

New technology allows continued filing by phone, with enhanced fraud detection By Mark Huffman of ConsumerAffairs…

Zooming in on Zoom’s unfair and deceptive security practices: More about the FTC settlement

This time last year, “zoom” was just a word related to speed. But the pandemic has…