The Anatomy of a Hack: The Internet Age of Criminals – Part 4

Defending Ourselves from Cyber Criminals.

In previous posts, I’ve explained how cybercrime is big business, and the criminals behind the illegal activity run sophisticated online companies. Today, let’s begin talking about how to defend your company against them. We’ll start with the Federal Trade Commission (FTC), the de facto data security and privacy enforcement authority in the United States.

The Anatomy of a Hack: The Internet Age of Criminals – Part 4

Unfair or Deceptive Practices

The 1914 Federal Trade Commission Act did away with the concept of “caveat emptor” (or, “buyer beware”), in favor of a more consumer-friendly regime that requires sellers to operate at a higher standard.

The law states that “Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful.” 15 U.S.C. § 45

Don’t let the simplicity of this law overshadow its broad power. It has been reimagined for our digital age to be applicable to the practice of cybersecurity.

The interpretation of this law regarding cybersecurity means that if you say in your privacy policy that you don’t collect the Social Security numbers of your customers, you better not do so.

And, if your website says you encrypt all personally identifiable information, you’d better do that.

The Anatomy of a Hack: The Internet Age of Criminals – Part 4

To do otherwise, in either case, you could be found to have committed an “unfair or deceptive act.” And, since 2010, the FTC has sanctioned over sixty companies for lapses in cybersecurity. Big names, like Twitter and Petco, as well as smaller ones, like GMR Transcription. You can read all about each case on the FTC’s website, but here’s a summary of each one I’ve mentioned:

In its action against Twitter, Inc., the FTC alleged that the company gave almost all of its employees administrative control over Twitter’s system. According to the FTC’s complaint, by providing administrative access to so many employees, Twitter increased the risk that a compromise of any of its employees’ credentials could result in a serious breach.

In the complaints against Petco Animal Supplies, Inc., the FTC alleged that they failed to implement policies and procedures to safeguard consumers’ information.

And, in its complaint against GMR Transcription, the agency alleged that GMR’s data security practices were inadequate and resulted in transcriptions of audio files provided by GMR’s customers being indexed by a major search engine and made publicly available to anyone using the search engine.

In Part 5 we’ll dive into why the FTC says you need to practice reasonable cybersecurity and what that means to you.


Identify your path to CFO success by taking our CFO Readiness Assessmentᵀᴹ.

Become a Member today and get 30% off on-demand courses and tools!

For the most up to date and relevant accounting, finance, treasury and leadership headlines all in one place subscribe to The Balanced Digest.

Follow us on Linkedin!