Skip to content

A legal blog about consumer and business data privacy and security in a high tech world

  • Home
  • About This Blog
  • Data Incident Response Team
  • State Data Breach & Privacy Laws
    • Kentucky Data Privacy Laws
    • Tennessee Data Privacy Laws
    • Mississippi Data Breach Laws
    • Indiana Data Privacy Laws
  • HITECH / HIPAA Resources
  • MU/MIPS News
  • More . . .
    • Webinars
  • Disclaimer
HomePosts tagged 'spoof email'

spoof email

FTC study identifies email tools businesses can use to screen out spoof email

March 24, 2017March 24, 2017 Kathie McDonald-McClure Cyber Security and Cyber Crime, Data Privacy & Security, FTC Enforcement, Privacy & Security beware of phishing emails, cybercrime, domain level email authentication, domain message authentication reporting and conformance DMARC, identity theft, spoof email, tax fraud

phishing scamsThe Federal Trade Commission (FTC) Bureau of Consumer Protection released a study this month (March 2017) indicating that business entities could be doing more to stop malicious emails from hitting the inboxes of employees.  The goal behind many malicious emails is to trick individuals into turning over either their own confidential, personal information or confidential business information to which the individual has access due to his or her job responsibilities. Cyber criminals use social media sites such as LinkedIn, an entity’s own website, Internet search engines and other public resources to identify individuals with likely access to valuable information.  The attacker uses such information to compose an email that spoofs an otherwise legitimate sender, such as a bank, mortgage company, Internet service provider (e.g., AT&T,  Verizon, Spectrum, etc.), a business partner or even another employee.  These malicious emails are commonly referred to as “phishing email” or “spoof email”.

The FTC’s report, titled Businesses Can Help Stop Phishing and Protect their Brands Using Email Authentication (Report), states that many businesses are not taking advantage of Continue reading →

Leave a comment

Follow me on Twitter

My Tweets

Federal Law Resources

  • > FTC Resources to Privacy & Security
  • > FTC Act Section 5: Unfair and Deceptive Practices
  • > FTC: Enforcing Privacy Promises
  • > FTC: Fair Credit Reporting Act (FCRA)
  • > FTC: Red Flags Rule for Identity Theft
  • > FTC: Gramm-Leach-Bliley Act for Financial Institutions
  • > FTC: Children’s Online Privacy Protection Act (COPPA)
  • > FTC 2012 Privacy Report
  • > FDIC: A Guide to Cybersecurity
  • > Federal Reserve: Interagency Guidelines Establishing Information Security Standards
  • > Health: FTC Personal Health Record Breach Notice Rule
  • > Health: FTC Best Practices for Mobile Health App Developers
  • > Health: HIPAA Omnibus Rule 2013
  • > Health: HIPAA Privacy Rule
  • > Health: HIPAA Security Rule
  • > Health: HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework
  • > U.S. Federal Privacy Council, Executive Order (2/9/2016)
  • > EU-U.S. Privacy Shield Framework (Proposed)
  • > Prosecuting Computer Crimes Manual

State Data Privacy Resources

  • > KY Data Breach Laws
  • > IN Data Breach Laws
  • > MS Data Breach Laws
  • > TN Data Breach Laws

Other Resources

  • > Data Security & Privacy Issues for Businesses (Whitepaper)
  • > KY Data Breach Law FAQs
  • > ProPublica: OCR HIPAA Complaint Closure Letters
  • > Wyatt Data Privacy & Security Legal Services

Other Wyatt Blogs

  • > Employment Law Report
  • > Environmental Update
  • > Finding IP Value

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,175 other followers

Copyright 2017. HITECH Law Blog. All rights reserved. Fair use with attribution welcomed.

THIS IS AN ADVERTISEMENT. SEE DISCLAIMER.
Blog at WordPress.com.
Cancel