FTC Posts Sixth Blog in Its “Stick with Security” Series
Time 2 Minute Read

On August 25, 2017, the FTC published the sixth blog post in its “Stick with Security” series. As we previously reported, the FTC will publish an entry every Friday for the next few months focusing on each of the 10 principles outlined in its Start with Security Guide for Businesses. This week’s post, entitled Stick with Security: Segment your network and monitor who’s trying to get in and out, illustrates the benefits of segmenting networks and monitoring the size and frequency of data transfers.

The practical guidance provides useful examples on how to:

  • Segment your Network: Companies today can link multiple devices together across a single network. While legitimate business reasons exist for such linkage, businesses should consider whether there is sensitive information on their networks requiring special treatment. Segmenting a network can include having separate areas of the network protected by firewalls which reject unnecessary traffic. This can reduce the impact of a breach, should it occur, by isolating it to a limited part of the system. For example, a company that maintains confidential client information can use a firewall to segment this part of its network from the portion of its network containing corporate website data.
  • Monitor Activity on your Network: Businesses should also monitor who is accessing, uploading or downloading information on the network. It is imperative to respond quickly if abnormal activity is detected. Numerous tools are available to warn businesses about attempts to access their networks without authorization, as well as to spot malicious software installs and suspicious data exfiltration.

The guidance concludes by noting the key lesson for businesses is to make things more difficult for hackers and this can be done by segmenting their networks and using readily accessible tools to monitor who is entering their system and what is leaving.

The FTC’s next blog post, to be published on Friday, September 1, will focus on securing remote access to your network.

To read our previous posts documenting the series, see FTC Posts Fifth Blog in its “Stick with Security” Series, FTC Posts Fourth Blog in its “Stick with Security” Series, FTC Posts Third Blog in its “Stick with Security” Series and FTC Posts Second Blog in its “Stick with Security” Series.

You May Also Be Interested In

Time 3 Minute Read

On March 20, 2026, Oklahoma Governor Kevin Stitt signed SB 546 into law, enacting the Oklahoma Consumer Data Privacy Act, which will take effect on January 1, 2027.

Time 2 Minute Read

On March 23, 2026, the UK Information Commissioner's Office released new guidance clarifying the use of the new recognized legitimate interest lawful basis for processing personal information under UK data protection law.

Time 2 Minute Read

On March 5, 2026, the California Privacy Protection Agency announced that the agency had reached a settlement with Ford Motor Company resolving an enforcement action against the company that alleged noncompliance with the California Consumer Privacy Act’s opt-out of sale/sharing rights.

Time 3 Minute Read

The Federal Trade Commission has issued a new Policy Statement encouraging the adoption of robust age‑verification technologies by pledging not to bring enforcement actions under the COPPA Rule against operators of general‑ or mixed‑audience sites that collect, use or disclose personal information solely to determine users’ ages, so long as long as they follow strict safeguards.

Search

Subscribe Arrow

Recent Posts

Categories

Tags

Archives

Jump to Page