Citadel Information Group

  • Home
  • About Us
    • About Citadel
    • Who We Are
    • When To Call Citadel
  • Services
    • Overview: Delivering Information Peace of Mind ® to Business and the Nonprofit Community
    • Citadel’s Information Peace of Mind ® Program
    • Assessments and Reviews
    • Information Security Policies and Standards
    • Secure The Human
    • Phishing Defense Training
    • CCPA and Defendable Security Procedures and Practices
    • Privacy: Information Inventory / Data Mapping
    • Security Management of the IT Network / Infrastructure
    • Incident Response / Business Continuity
    • Secure Application Development — Learn By Doing
    • Litigation Support
    • Keynotes
    • Client Success Stories
  • Blog
  • Resources
    • Information Security Library
      • Citadel Guides
      • Awareness Posters
      • For Boards and the C Suite
      • Cybersecurity Law
      • Cybersecurity Surveys
      • HIPAA HITECH
      • Insurance and Risk Management
      • National Cybersecurity
      • Online Bank Security
      • Payment Card Industry Data Security Standard
      • Personal Cybersecurity
      • Securing the IT Network
      • Helpful Links
    • Blogs
      • Cybersecurity Blogs
      • Leadership and Culture Change Blogs
  • Contact

June 12, 2019 by stan

CCPA and Minimum Reasonable Security Procedures and Practices: A Floor on “Defendability”

Reasonable Security Procedures and Practices The California Consumer Privacy Act (CCPA) private right of action establishes statutory damages of between $100 and $750 per incident for consumers whose personal information has been compromised by a breach of personal information resulting from the business’ “violation of the duty to implement reasonable security procedures and practices appropriate Read More

Filed Under: Citadel Security Guides

July 8, 2017 by noah

Secure Application Development: The CISO’s Role — a Citadel – WhiteHat Webinar

Watch the Webinar Since software development emerged as an engineering discipline nearly 40 years ago, an ongoing challenge has been the difficulty “connecting the dots” between non-technical management and application technology developers. With information security spanning the organization and with the security devils hiding in the details, the CISO is in a unique leadership role Read More

Filed Under: Citadel Security Guides

May 25, 2017 by Stan Stahl Ph.D.

Citadel’s Dr. Stan Stahl talks with Larry Marino about creating a cybersecurity-aware culture. Distrust & Caution!

Stan Stahl, President Citadel Information Group and Secure the Village – a non-profit helping executives understand Cyber Security – speaks with Larry Marino on Sunday Morning Newsmakers. A ransomware program called WannaCry has shut down more than 75,000 computers across 99 countries, including a string of hospitals in the United Kingdom. Stan discusses the implications, Read More

Filed Under: Citadel Security Guides, Media

April 11, 2013 by stan

Three Rules for Password Sanity

Let’s start with the obvious. We all hate passwords. Users hate passwords because they are hard to remember and they slow you down, getting in the way of the computing experience. IT staff hate passwords because they’re just one more critical thing that needs to be managed, taking valuable time away from keeping computer systems Read More

Filed Under: Citadel Security Guides

March 27, 2013 by stan

Three Defense Tactics for Improved Workstation Protection

Cyber criminals target users and their workstations. This makes workstation defense a vital tactic in cyber security management. While most users have anti-virus software on their workstations — and while antivirus protection is a necessary element of basic workstation protection — the reality is that the antivirus protection you run simply can’t keep up with Read More

Filed Under: Citadel Security Guides, Weekend Patch Report

March 21, 2012 by Stan Stahl Ph.D.

Eight Security Concerns Before Jumping Into the Cloud

Hypothesis 1: Over the next 3 – 5 years increasing numbers of mid-market and smaller companies will find it makes great business sense to embrace various Cloud solutions, including Salesforce, Exchange and other applications, file servers in the Cloud like Amazon and iCloud, and complete private cloud solutions. Hypothesis 2: Over the next 3 – Read More

Filed Under: Citadel Security Guides

March 7, 2012 by Stan Stahl Ph.D.

Protecting Your Computer: An Example of Defense-in-Depth.

A reader asks: “What is the possibility of my personal computer being affected? I have two virus protection programs on the computer.” Dear Reader: The possibility of your personal computer being affected is high. Having an anti-virus program (or even two) on your computer is a cyber security requirement just like having a lock on Read More

Filed Under: Citadel Security Guides

February 29, 2012 by Stan Stahl Ph.D.

Cyber Security – Don’t leave home without it

Don’t neglect cyber security when you’re traveling. Traveling exposes you to higher than normal cyber risk. This is true whether you’re planning to surf the web, do email, or Skype with family and friends. It’s particularly true if you plan to conduct sensitive corporate business online, especially in certain Asian and Eastern European countries with Read More

Filed Under: Citadel Security Guides, Weekend Patch Report

June 24, 2011 by Stan Stahl Ph.D.

Can You Prevent Hackers from Taking Over Websites? Web-Site Security Basics.

I was recently asked if I had any methods to “prevent hackers” from taking over websites. Alas. I don’t. No one does and it’s doubtful that we will ever have methods to “prevent hackers from taking over websites” any more than we could develop methods to “prevent car thieves from stealing cars.” But, just like Read More

Filed Under: Citadel Security Guides

March 5, 2011 by Stan Stahl Ph.D.

Six Simple Tips to Lower Risk of Online Bank Fraud

1) Use Stand-Alone Workstation for On-Line Banking      • Use Only for On-Line Banking      • Don’t Connect It to Corporate Network      • Use a Separate Internet Connection      • Keep It Fully Patched      • Keep Anti-Malware Up-to-Date 2) Get Separate Out-Of-Band Confirmation from Your Bank for All Online Transactions 3) Reconcile Online Accounts Daily Using Out-of-Band Account Read More

Filed Under: Citadel Security Guides

  • 1
  • 2
  • Next Page »

Call us for a free confidential consultation:
323-428-0441

Get our newsletter

A weekly report of critical security updates and the latest cybersecurity news delivered to your inbox from Secure The Village.

Sign Up

Categories

Get in touch

323 428 0441
info@citadel-information.com

Citadel Information Group
Citadel on Linkedin
SecureTheVillage on Linkedin

About Us

Citadel Information Group is a full service integrated information security management / governance firm. We work either consultatively or as part of a client’s senior management team, assisting our clients cost-effectively manage the confidentiality, privacy, integrity and availability of their information. Learn more.

Key Resources

  • The Citadel Way to Information Security Management
  • Creating a Cybersecurity Aware Culture
  • Secure Application Development: The CISO’s Role – a webinar with WhiteHat Security
  • Information Security Library

Copyright © 2018 by Citadel Information Group  All Rights Reserved | Privacy Policy