FTC Posts Seventh Blog in Its "Stick with Security" Series
Time 2 Minute Read

On September 1, 2017, the FTC published the seventh blog post in its “Stick with Security” series. As we previously reported, the FTC will publish an entry every Friday for the next few months focusing on each of the 10 principles outlined in its Start with Security Guide for Businesses. This week’s post, entitled Stick with Security: Secure remote access to your network, outlines important security measures businesses should take to ensure that outside entryways to their systems are sensibly defended.

The security protections include:

  • Ensure Endpoint Security: Before allowing remote access to a network, businesses should set security ground rules, communicate these rules clearly and verify that the person who will access the network is in compliance. In addition to putting these rules in place, companies should also ensure that devices used to connect to the network from the outside are up to date in terms of software, patches and other security features. Companies should further approach endpoint security as an ongoing process and regularly evaluate their security requirements and block remote access by devices with outdated security.
  • Put Sensible Access Limits in Place: Businesses should not only control access to data in-house but also remotely. For example, a business engaging a remote contractor to update its payroll system should provide remote access only to the parts of the network necessary to complete the task. The scope and duration of access will depend on the task at hand, but for all remote users, access should be tailored to ensure appropriate protection of the network.

The guidance concludes by noting that the key message for businesses is if you allow remote access to your network, be vigilant about defending the outside entryways.

The FTC’s next blog post, to be published on Friday, September 8, will focus on applying sound security practices when developing new products.

To read our previous posts documenting the series, see FTC Posts Sixth Blog in Its “Stick with Security” Series, FTC Posts Fifth Blog in Its “Stick with Security” Series, FTC Posts Fourth Blog in Its “Stick with Security” Series, FTC Posts Third Blog in Its “Stick with Security” Series and FTC Posts Second Blog in Its “Stick with Security” Series.

You May Also Be Interested In

Time 3 Minute Read

The Connecticut Attorney General recently issued a legal memorandum regarding the application of existing Connecticut laws, such as the Connecticut Data Privacy Act, to the use of artificial intelligence.

Time 3 Minute Read

The Federal Trade Commission has issued a new Policy Statement encouraging the adoption of robust age‑verification technologies by pledging not to bring enforcement actions under the COPPA Rule against operators of general‑ or mixed‑audience sites that collect, use or disclose personal information solely to determine users’ ages, so long as long as they follow strict safeguards.

Time 6 Minute Read

On February 9, 2026, trade association NetChoice filed a lawsuit challenging South Carolina’s newly passed Age-Appropriate Code Design (“SC AACD”) on First and Fourteenth Amendment grounds. The SC AACD was signed into law on February 5, 2026, making South Carolina the fifth U.S. state to enact such a law, following California, Maryland, Nebraska and Vermont.

Time 1 Minute Read

On February 6, 2026, the Federal Trade Commission announced its second report to Congress on its efforts to combat ransomware and other cyber attacks.

Search

Subscribe Arrow

Recent Posts

Categories

Tags

Archives

Jump to Page