FTC Safeguard Rule

Let Us Help You Meet FTC’s Safeguard Rule

Schedule an FTC Safeguard consultation with our experts to review the requirements and make sure you’re covered

Speak with Us

Secure Your Data and Protect Your Business

The FTC Safeguard amendment identifies nine elements that your security program must cover.

  1. Designate a Qualified Individual to implement and supervise your company’s information security program; a Qualified Individual can be an employee or work for an affiliate or service provider and does not require a particular degree or title
  2. Conduct a risk assessment
  3. Design and implement safeguards to control the risks identified through your risk assessment
  4. Regularly monitor and test the effectiveness of your safeguards
  5. Train your staff
  6. Monitor your service providers
  7. Keep your information security program current
  8. Create a written incident response plan
  9. Require your Qualified Individual to report to your Board of Directors.

Read more on the FTC Standards

How RebootTwice Assists You To Get FTC Safeguard-Compliant

Regulation   HOW RebootTwice CAN HELP
Designate a Qualified Individual to implement and supervise your company’s information security program    
Conduct a risk assessment   Provided by RebootTwice 
  Implement and review your access controls Sophos MDR Identity Integration Pack* (requires an existing IAM solution)
  Identify risks and their potential impact

Sophos MDR with Sophos NDR

Sophos Cloud Native Security

  Encrypt customer information on your systems and when it’s in transit

Sophos Email

Sophos Encryption

  Assess your apps

Provided by RebootTwice 

Design and implement safeguards to control the risks identified through your risk assessment Implement multi-factor authentication for anyone accessing customer information on your systems Sophos MDR Identity Integration Pack* (requires an existing MFA solution)
  Dispose of customer information securely  
  Anticipate and evaluate changes to your information systems or networks We perform security configuration health checks with Sophos Intercept X and find anomalies with Sophos Cloud Native Security.
  Maintain a log of authorized user activity and keep an eye out for unauthorized access Sophos MDR
Regularly monitor and test the effectiveness of your safeguards   Sophos MDR
Train your staff   Sophos Phish Threat
Monitor your service providers   Sophos MDR
Keep your information security program current    
Create a written incident response plan   Provided by RebootTwice 
Require your Qualified Individual to report to your Board of Directors    
   

 

Don’t Wait Any Longer to Get FTC Safeguard-Ready 

RebootTwice can help you however you need us. We can optimize your security protocols, keep your data secure and private, and block active threats — all through a single cloud security platform.

Please use the contact form below, if you have any general questions or requests about our services.

  •