Reasonable Security Procedures and Practices The California Consumer Privacy Act (CCPA) private right of action establishes statutory damages of between $100 and $750 per incident for consumers whose personal information has been compromised by a breach of personal information resulting from the business’ “violation of the duty to implement reasonable security procedures and practices appropriate Read More
Secure Application Development: The CISO’s Role — a Citadel – WhiteHat Webinar
Watch the Webinar Since software development emerged as an engineering discipline nearly 40 years ago, an ongoing challenge has been the difficulty “connecting the dots” between non-technical management and application technology developers. With information security spanning the organization and with the security devils hiding in the details, the CISO is in a unique leadership role Read More
Citadel’s Dr. Stan Stahl talks with Larry Marino about creating a cybersecurity-aware culture. Distrust & Caution!
Stan Stahl, President Citadel Information Group and Secure the Village – a non-profit helping executives understand Cyber Security – speaks with Larry Marino on Sunday Morning Newsmakers. A ransomware program called WannaCry has shut down more than 75,000 computers across 99 countries, including a string of hospitals in the United Kingdom. Stan discusses the implications, Read More
Three Rules for Password Sanity
Let’s start with the obvious. We all hate passwords. Users hate passwords because they are hard to remember and they slow you down, getting in the way of the computing experience. IT staff hate passwords because they’re just one more critical thing that needs to be managed, taking valuable time away from keeping computer systems Read More
Three Defense Tactics for Improved Workstation Protection
Cyber criminals target users and their workstations. This makes workstation defense a vital tactic in cyber security management. While most users have anti-virus software on their workstations — and while antivirus protection is a necessary element of basic workstation protection — the reality is that the antivirus protection you run simply can’t keep up with Read More
Eight Security Concerns Before Jumping Into the Cloud
Hypothesis 1: Over the next 3 – 5 years increasing numbers of mid-market and smaller companies will find it makes great business sense to embrace various Cloud solutions, including Salesforce, Exchange and other applications, file servers in the Cloud like Amazon and iCloud, and complete private cloud solutions. Hypothesis 2: Over the next 3 – Read More
Protecting Your Computer: An Example of Defense-in-Depth.
A reader asks: “What is the possibility of my personal computer being affected? I have two virus protection programs on the computer.” Dear Reader: The possibility of your personal computer being affected is high. Having an anti-virus program (or even two) on your computer is a cyber security requirement just like having a lock on Read More
Cyber Security – Don’t leave home without it
Don’t neglect cyber security when you’re traveling. Traveling exposes you to higher than normal cyber risk. This is true whether you’re planning to surf the web, do email, or Skype with family and friends. It’s particularly true if you plan to conduct sensitive corporate business online, especially in certain Asian and Eastern European countries with Read More
Can You Prevent Hackers from Taking Over Websites? Web-Site Security Basics.
I was recently asked if I had any methods to “prevent hackers” from taking over websites. Alas. I don’t. No one does and it’s doubtful that we will ever have methods to “prevent hackers from taking over websites” any more than we could develop methods to “prevent car thieves from stealing cars.” But, just like Read More
Six Simple Tips to Lower Risk of Online Bank Fraud
1) Use Stand-Alone Workstation for On-Line Banking • Use Only for On-Line Banking • Don’t Connect It to Corporate Network • Use a Separate Internet Connection • Keep It Fully Patched • Keep Anti-Malware Up-to-Date 2) Get Separate Out-Of-Band Confirmation from Your Bank for All Online Transactions 3) Reconcile Online Accounts Daily Using Out-of-Band Account Read More