Nicole Hennig is an expert in mobile technologies for libraries. In her 14 years of experience at the MIT Libraries, she won awards for innovation and worked to keep academics up to date with the best mobile technologies. Now she has her own business helping librarians stay current with new technologies. She is the author of several books, including Keeping Up with Emerging Technologies and Apps for Librarians. Like most librarians, she is passionate about access to information for all. To stay current with the best technologies for education and productivity, sign up for her email newsletter, Mobile Apps News, on nicolehennig.com.
- Table of Contents
- About the Authors
Library Technology Reports, April 2018 (54:3)
It seems that every day there is news of a security breach or invasion of privacy. From ransomware to widespread breaches of private data, the news is full of scare stories. Sometimes it seems that there is nothing that you can do to protect your data. Luckily, there are strategies you can implement and actions you can take to reduce your risk. You can learn to see beyond the hype of media scare stories and learn what’s worth paying attention to by following certain best practices. This issue of Library Technology Reports (vol. 54, no. 3), “Privacy and Security Online: Best Practices for Cybersecurity,” answers the following questions:
- What are the best ways to back up data?
- What’s the best thing to do if your device is lost or stolen?
- How do intruders get access to your data?
- Can criminals hold your data captive and ask for ransom?
- Is your laptop’s or smartphone’s traffic being harvested when on public Wi-Fi?
- Should you trust a password manager?
- Is it advisable to use Touch ID or Face ID on iPhones?
- How can you browse the web privately and anonymously?
- How can you protect your privacy on Facebook?
- Should you use encrypted messaging and email? How?
- How can you control your privacy if you use smart home devices like Amazon Alexa or Google Home?
Using advice from security experts, this report discusses the difference between possible threats and likely risks. It also provides advice on how to make your own security plan and concludes with ideas for sharing this information with your library users.
Chapter 1—Assessing Your Security and Privacy Needs
- Which Advice to Trust
- Building Your Threat Model
- Lost or Stolen Devices
- How Intruders Get In
- Using Public Wi-Fi
- Passwords and Authentication
- Data Breaches and Identity Theft
- Is Prviacy Dead?
- Private Browsing and Searching
- More Privacy with Encrpyption
- Webcam Privacy and Internet of Things
Chapter 4—Applying Best Practices
- Why It's Important to Practice Effective Security
- Tips for Getting Started
- Assisting Library Users