article thumbnail

How the FTC’s Amendments to the Safeguards Rule Affects Auto Dealerships

Duo's Security Blog

And one of the few security technologies that is specifically called out by the FTC is multi-factor authentication (MFA). In 1999, Congress passed the Gramm-Leach-Bliley Act (GBLA) that established the 2002 Safeguards Rule. Multi-factor authentication helps security teams control access to sensitive data.

article thumbnail

How to Comply with the U.S. Federal Trade Commission’s (FTC) revised Safeguards Rule

CyberSecurity Insiders

The rule was first introduced in 2002 and has been revised multiple times to keep up with evolving technology and security threats. Implementation of multi-factor authentication. The revised Safeguards Rule also requires implementation of multi-factor authentication. What is the FTC Safeguards Rule?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pro-Russian LockBit 3.0 Claims Responsibility for Attack on Japan Port

SecureWorld News

The port has remained Japan's largest since 2002. John Bambenek, Principal Threat Hunter at Netenrich, said: "Part of the reason technology is so cheap is because technology companies outsource the risks of using their products to their customers. Its suppliers, including Denso Corp., Aisin Corp., and Toyota Industries Corp.,

article thumbnail

The Origins and History of the Dark Web

Identity IQ

2002 – 2006: Origins of the Tor Project After onion routing was patented, additional computer scientists joined the original development team in 2002 and created the biggest project for onion routing yet: The Onion Routing Project, now commonly known as the Tor Project. Turn on multifactor authentication for all online accounts.

article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

Quantum computing focuses on developing computer technology based on principles that describe how particles and energy react at the atomic and subatomic levels. While the science is a bit muddy for those who are not quantum theory experts, we can all agree that quantum computing is faster than any other computing technology.

Risk 134
article thumbnail

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

Interestingly, 61 percent of all SMBs and 79 percent of large SMBs believe cyberhackers have more sophisticated technology at their disposal than the SMBs’ own cybersecurity resources. “I The company got its start in 2002 in Gulf Breeze, Florida, as a two-man operation that set out to help small firms filter the early waves of email spam.

Risk 182
article thumbnail

FISMA Compliance: A Complete Guide to Navigating Low, Moderate, and High Levels

Centraleyes

The impact level categorizations defined in the context of FISMA standards compliance, particularly as outlined in FIPS-199, were established by the National Institute of Standards and Technology (NIST). FISMA Compliance FISMA, enacted in 2002, incorporated the principles outlined in FIPS-199 into its framework.

Risk 52