NEW AMENDMENTS TO THE FEDERAL TRADE COMMISSION LAW
In November 2023, New York updated its cybersecurity law, FTC 23 NYCRR 500, affecting all financial firms in the state, and those financial companies nationwide with customers from New York.
With the April 15th compliance deadline near, it’s important to understand and apply these new changes.
What do you need to comply with?
The amendments have expanded the number of, and scope of cybersecurity requirements for compliance. Each part of the Federal Trade Commission’s Safeguards Rule has been further defined and specified with additional details. The expanded implementation necessities regarding each section’s cyber requirement have been noted below.
BEFORE:
Designate an Employee to Coordinate Information Security Program (Rule 314.4(a))
- Risk assess considerations of each relevant area of operations including employee training and management, and information systems, detecting, preventing and responding to attacks, intrusions, or other systems failures.
- Including requiring services providers by contract to implement and maintain such safeguards.
- Including any time a material change to operations or business arrangements affects on your information security program.
Over NINTY new full definitions added to the Safeguards with explanations detailed.
- Appoint a qualified individual to oversee and implement the information security program.
- Qualified individual must have information security training, partake in continuing education, and ensure organization’s compliance
- If using a service provider or affiliate, ensure they maintain a program meeting these standards.
- Senior personnel must oversee the Qualified Individual.
- Conduct written risk assessments to identify and control risks to customer information.
- Include criteria for evaluating security risks and assessing existing controls.
- Periodically reevaluate risks and update risk assessments.
- Recommends at minimum yearly, but ideally quarterly or even monthly.
- Implement controls to manage identified risks.
- Use encryption for customer information in transit and at rest, or employ alternative controls if encryption is infeasible.
- Restrict access to authorized users only.
- Adopt secure development practices for in-house and external applications.
- Require multi-factor authentication for system access.
- Develop procedures for secure data disposal and minimize data retention.
- Regularly test and monitor the effectiveness of safeguards.
- Conduct annual penetration testing and bi-annual vulnerability assessments.
- Provide security awareness training to personnel.
- Employ qualified information security personnel.
- Ensure information security personnel are up-to-date with security threats.
- Select service providers capable of maintaining appropriate safeguards.
- Require service providers to maintain safeguards contractually.
- Regularly assess service providers based on risk and safeguards’ adequacy.
- Based on NIST cybersecurity standard
- Regularly evaluate and adjust the information security program based on test results, operational changes, risk assessment outcomes, or other relevant factors.
- Review at minimum annually.
- Establish a written plan for responding to security events.
- Include goals, response processes, roles, communication strategies, and remediation requirements.
- Regularly review and update the incident response plan, at minimum annually.
- The Qualified Individual must report annually to the board of directors or a senior officer.
- The report should include the status of the information security program and address key issues like risk management, service provider arrangements, and security events.
Let us handle all of the paperwork and implementation that will bring your company into Full FTC Compliance, alongside technical optimization so you run more smoothly than ever before.
Hand off the stress and frustration of FTC Compliance to an expert Cybersecurity and Compliance Team that works specifically with companies like yours and understands your unique day to day business operations and technical needs.
Start with a FREE No-Nonsense Technology and FTC Compliance Assessment to gain the knowledge of where you stand and what you need. You also need one for certifying proof of FTC Compliance so it’s two birds with one stone – knowledge and power.
Claim your FREE No-Nonsense Technology and FTC Compliance Asssessment by CLICKING HERE.
5 BIGGEST CHANGES
TO FTC LAW
Multi Factor Authentication
- Utilize MFA for local access to laptops and computers
- Remote access, Office 365 and More
- App or Token Based MFA preferred, Text-Based is no longer secure or recommended.
Endpoint Security
- Endpoint security is a cybersecurity approach that focuses on protecting individual devices, such as computers, smartphones, and servers, from various cyber threats like malware and unauthorized access.
- It encompasses a combination of measures such firewalls, and intrusion detection systems to secure these devices and safeguard an organization's data and network integrity.
Asset Management and Application Control
- Must be able to track owner, location, sensitivity, support expiration date, and recovery time objectives for EACH asset (laptop, phone, pc)
- Regularly update and validate the asset inventory
- Policy for secure disposal of nonpublic information
- Have in place the ability to scan and detect malicious applications and prevent them from being installed to systems.
Penetration Testing
- By simulating real-world cyberattacks, it provides a critical means for agencies to discover and rectify security weaknesses, ultimately improving overall security posture, reducing the risk of breaches, and safeguarding sensitive data and customer trust.
PROOF OF CYBERSECURITY IMPLEMENTATION
- Certifies entity complied during prior calendar year
- Must provide data and documentation to accurately demonstrate compliance in the form of reports, certifications or otherwise
- Signed by CISO (Chief Information Security Officer) and CEO responsible
Companies can face exorbitant fines of up to $100,000 per violation for non-compliance. Beyond the immediate financial setback, non-compliance can also lead to crippling business disruptions, and audits. Moreover, companies may face legal action if data might have been compromised.
ALIGNMENTS WITH OTHER REGULATIONS:
Our Free Compliance Assessment Will Give You The
Answers You Want, The Certainty You Need.
This Assessment will provide verification from a Qualified Third Party on your FTC Compliance posture, whether or not your current IT company is doing everything they should be, and if your business is at serious risk for hacker attacks, data loss and extended downtime, as well as how to solve these issues.
- Whether or not you're currently in Compliance with FTC Cybersecurity Law.
- Where you are overpaying (or getting underserved) for the services and support you are currently getting from your current IT company or team.
- If you and your employees’ login credentials are being sold on the Dark Web.
- IF your IT systems and data are truly secured from hackers, cybercriminals, viruses, worms and even sabotage by rogue employees.
- IF your current backup would allow you to be back up and running again fast if ransomware locked all your files.
- Do your employees truly know how to spot a phishing e-mail? We will actually put them to the test. We’ve never seen a company pass 100%. Never.
- IF your IT systems, backup and data handling meet strict compliance requirements for data protection.
- If your company (and your reputation) are at RISK and how your employees can work from home without compromising the security of your customers data.
- How you could lower the overall costs of IT while improving communication, security and performance, as well as the productivity of your employees.
Walter Contreras, registered FTC instructor, Cybersecurity expert, and CEO of Motiva Networks understands how the world’s digital transformation is impacting small to medium sized businesses. With over 25 years of experience in information technology and cybersecurity, his vision is clear – safeguarding and strengthening the digital backbone of business owners.