Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Privacy and Security Online : Best Practices for Cybersecurity, Paperback / softback Book

Privacy and Security Online : Best Practices for Cybersecurity Paperback / softback

Part of the Library Technology Reports series

Paperback / softback

Description

It seems that every day there is news of a security breach or invasion of privacy.

From ransomware to widespread breaches of private data, the news is full of scare stories.

Sometimes it seems that there is nothing that you can do to protect your data.

Luckily, there are strategies you can implement and actions you can take to reduce your risk.

You can learn to see beyond the hype of media scare stories and learn what’s worth paying attention to by following certain best practices.

This issue of Library Technology Reports (volume 54, no. 3), “Privacy and Security Online: Best Practices for Cybersecurity,” answers the following questions:What are the best ways to back up data?What’s the best thing to do if your device is lost or stolen?How do intruders get access to your data?Can criminals hold your data captive and ask for ransom?Is your laptop’s or smartphone’s traffic being harvested when on public Wi-Fi?Should you trust a password manager?Is it advisable to use Touch ID or Face ID on iPhones?How can you browse the web privately and anonymously?How can you protect your privacy on Facebook?Should you use encrypted messaging and email?

How?How can you control your privacy if you use smart home devices like Amazon Alexa or Google Home?Using advice from security experts, this report discusses the difference between possible threats and likely risks.

It also provides advice on how to make your own security plan and concludes with ideas for sharing this information with your library users.

Information

Information