• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Search
Search
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Security
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Security for Chromebook
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella and Cisco Secure Access Packages
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
      • Cisco Umbrella for Government Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Your SSE journey with Cisco
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
      • Umbrella and Duo Layered Protection
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
        • – FTC Safeguards Rule Compliance 2023
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
      • Cybersecurity Webinars
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Security Definitions
      • What is DNS Security
      • What is a Secure Web Gateway
      • What is a Cloud Access Security Broker (CASB)
      • What is Security Service Edge (SSE)
      • What is Secure Access Service Edge (SASE)
      • Cyber Threat Categories and Definitions
    • For Customers
      • Support
      • Customer Success Webinars
      • Free Trial Quick Start Guide
      • Free Trial Help and Tips
  • Trends & Threats
    • Market Trends
      • Generative AI Cybersecurity Risks and Rewards
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Clearing search keywords
Spotlight

Creating a Cybersecurity Program That Complies With the FTC Safeguards Rule

Author avatar of Christina HausmanChristina Hausman
May 9, 2023 • 4 minute read
View blog >

In October 2021, the United States Federal Trade Commission (FTC) announced changes to the Safeguards Rule, requiring greater security measures from “non-banking” organizations handling and transacting consumer financial data. The deadline for compliance is June 9, 2023.

What does the FTC Safeguards Rule require?

The FTC Safeguards Rule applies to U.S. businesses that are “significantly engaged” in providing financial products or services, regardless of their size. The FTC’s definition of a financial institution covered by the Safeguards Rule includes many types that may not typically describe themselves in that way.

A list of types of businesses that are affected by the FTC Safeguards Rule

These businesses covered by the FTC Safeguards Rule are required to develop, implement, and maintain a comprehensive security program to protect their customer’s information. 

This program should have the following objectives:

  • Ensure the security and confidentiality of customer information
  • Protect against anticipated security threats
  • Protect against unauthorized access to customer information

It’s important to remember the Safeguards Rule requires mitigation of “reasonably foreseeable internal and external risks” – in other words, protection against data breaches, data leakage, phishing, and ransomware.

That’s good business practice anyway. If your day-to-day business is operational and productive and not offline due to a malware attack, then your business can achieve its goals, whether those are profit, growth, long-term wealth for you and your employees, or solving customer problems.   

Developing a cybersecurity program

Practical steps your business can take immediately to develop a comprehensive security program include deploying a flexible product like Cisco Umbrella that allows you to quickly deploy DNS-layer security in 24 hours to begin demonstrating compliance. Umbrella also allows you to incrementally deploy additional layers of protection to comprehensively address both compliance and security needs, leveraging features like:

  • Data loss prevention (DLP)
  • Cloud access security broker (CASB)
  • Remote browser isolation (RBI)
  • Malware inspection
  • Web security features

All of these solutions are managed from a single browser interface.

A graphic showing the components of Cisco Umbrella that help with your compliance journey.

But how to begin identifying those risks for the security program required by the FTC Safeguards Rule?  One method is to leverage the MITRE ATT&CK framework, a global knowledge base of adversary tactics and techniques based on real-world observations. 

Using MITRE ATT&CK as a frame of reference, here are a few key risks that may be important to include in your FTC Safeguards Rule security program, with specific Cisco Umbrella way to mitigate them:

Mixed-mode workstation risks

RiskMITRE Att@ckMitigations
Systems with customer financial information also used for personal activities subject to drive-by compromise, phishing, and valid account compromise.Drive-by Compromise

Browser Session Hijacking

Command and Control (Web)

Command and Control (DNS)
Umbrella Remote Browser Isolation protects against browser-based threats

Umbrella DNS security detects/mitigates ransomware, C&C, phishing

Umbrella secure web gateway analyzes content via sandboxing, blocks risky sites

Umbrella SNORT IPS detects malware

Umbrella CASB controls app access, secures resources on shared domains

On their personal time, employees may use business laptops, desktops, and mobile phones for their own personal usage, watching videos, browsing, posting social media updates, etc. This can introduce risks and vulnerabilities, because those same devices access customer information during working hours.

Phishing attacks

RiskMITRE Att@ckMitigations
Trick users into clicking links that download malware or direct them to malicious websites where identity is compromised.PhishingUmbrella DNS mitigates phishing attempts, and protects users from accessing known malicious domains and websites – before connections are made

Umbrella Secure Internet Gateway (SIG) adds additional security; its Secure Web Gateway functionality can blog access to compromised websites designed to steal personal information

Phishing attacks often involve creating fake links that appear to be from a legitimate organization using methods like email, text messages, and fake online ads. The victim may be lured into clicking a link where malware is then downloaded to their device, or they may be redirected to a malicious website where they are tricked into providing their credentials, which are then stolen.

Ransomware and data destruction

RiskMITRE Att@ckMitigations
Data and file destruction or encryption to interrupt business operationsData Destruction

Data Encrypted for Impact
Umbrella blocks access to malicious IP addresses, websites

Umbrella disrupts adversary Command & Control Callbacks

Umbrella CASB blocks unauthorized access to cloud applications and their data

Ransomware is a specific type of malware designed for the purpose of extorting money from victims. It prevents targeted organizations from accessing their IT systems (servers, databases, workstations, etc.) until a ransom is paid, with the threat of data destruction unless payment is made. A phishing attack can be the delivery method to introduce ransomware into your business. 

Cloud data exfiltration

RiskMITRE Att@ckMitigations
Adversaries may access data from improperly secured cloud storage and package it to avoid detection during removal.Data from Cloud StorageDetection of data exfiltration via DNS tunneling events

DLP capabilities for detecting and blocking sensitive data in motion from leaving your on-premises and cloud-based systems

Cloud DLP can identify sensitive data in cloud data stores

CASB functionality can limit access to high-risk cloud applications

Data exfiltration is a security concern for all businesses, independent of whether the data is stored on-premises or in the cloud. Businesses utilizing the cloud to host applications and customer data do not control the physical network infrastructure. In public clouds, the network fabric of the hosting provider is shared, and there is no perimeter in the traditional sense. Securing data in the cloud requires new security approaches and methods of monitoring and controlling data access.

Start getting compliant today

It’s important for businesses to deploy security products that are easy to use, flexible, and allow them to move towards compliance in 24 hours and then add on additional layers of security protections to improve their overall business posture. Cisco Umbrella meets business needs for compliance, security, and productivity.

In environments where compliance is a cost of doing business, there is no time to lose. Implement Umbrella and begin checking off critical items for demonstrating FTC Safeguards Rule compliance in days — not weeks or months.

Want to learn more about how Cisco Umbrella can help you on your road to compliance? Check out our White Paper on the FTC Safeguards Rule. And if you’d like to give Umbrella a try yourself, be sure to sign up for a free trial.

Start a free trial today

Block more threats, speed incident response, and improve internet performance.

Get your Free Trial

Practical steps your business can take immediately to develop a comprehensive security program include deploying a flexible product like Cisco Umbrella that allows you to quickly deploy DNS-layer security in 24 hours.

Post this quote

Additional Resources

  • FTC Safeguards Rule White Paper
  • FTC Safeguards At-a-Glance
  • FTC Safeguards Infographic

Suggested Blogs

  • Where Do I Start With SASE Evaluations? Gartner® Report September 10, 2024 3 minute read
  • Cisco Umbrella: A Leader in the GigaOm Radar for DNS Security June 26, 2024 3 minute read
  • The Perfect Blend: Qdoba’s SASE Transformation May 30, 2023 2 minute read

Share this blog

FacebookTweetLinkedIn
Subscribe to the Cisco Umbrella blog Subscribe

Follow Us

Facebook X LinkedIn Youtube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2025 Cisco Umbrella