Chapter 4. Applying Best Practices

Authors

  • Nicole Hennig

Abstract

Chapter 4 of Library Technology Reports (vol. 54, no. 3), “Privacy and Security Online: Best Practices for Cybersecurity”

Chapter 4 discusses the importance of implementing best security practices. It gives some tips for getting started, with a list of which topics in this report are the best starting points. It also discusses ideas for assisting and educating library users about these practices. It concludes with a bibliography for learning more about these topics.

Author Biography

Nicole Hennig

Nicole Hennig is an expert in mobile technologies for libraries. In her fourteen years of experience at the MIT Libraries, first as web manager, then as head of user experience, she won awards for innovation and worked to keep academics up-to-date with the best mobile technologies. In 2013, she left to start her own business helping librarians stay current with new technologies. She is the author of several books, including Keeping Up with Emerging Technologies: Best Practices for Information Professionals. Her newsletter, Mobile Apps News, helps librarians stay current with mobile technologies. For more information, visit her website http://nicolehennig.com.

References

Brian Krebs, “Who Makes the IoT Things under Attack?” Krebs on Security (blog), October 3, 2016, https://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack.

Brian Krebs, “Hacked Cameras, DVRs Powered Today’s Massive Internet Outage,” Krebs on Security (blog), October 21, 2016, https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage.

Darrin Pauli, “Ransomware Scum Offer Free Decryption if You Infect Two Mates,” The Register, December 11, 2016, www.theregister.co.uk/2016/12/11/ransomware_offer_pay_us_a_770_ransom_or_infect_two_friends.

“How to Organize a Crypto­Party,” CryptoParty wiki, last modified September 29, 2017, https://www.cryptoparty.in/organize/howto.

See “Playlists,” Electronic Frontier Foundation, Surveillance Self-Defense, accessed January 8, 2018, https://ssd.eff.org/en/playlist.

Nicole Hennig, “Privacy and Security Online Course,” accessed January 8, 2018, http://nicolehennig.com/courses/privacy-security-best-practices-library-users.

Downloads

Published

2018-03-26

Issue

Section

Chapters