30 Apps for Librarians Sana Moulder & Bryson Kopf.

Slides:



Advertisements
Similar presentations
So much alike! What is Personal Branding? 1. Make a clear, specific, and consistent image of yourself on the internet that reflects who YOU are. 2. Make.
Advertisements

Easier Internet Browsing and Better Password Security by SIR Phil Goff Branch 116 January 15,
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Introduction to Depository Institutions Presented by Day 2.
Microsoft Passport Waldemar Swiercz.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
How To Protect Your Privacy and Avoid Identity Theft Online.
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
A+ Certification Guide Chapter 10 Mobile Devices.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
How To Protect Your Privacy and Avoid Identity Theft Online.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Emily J. Hurst, MSLS Technology Coordinator National Network of Libraries of Medicine South
Tablet Camp 2015 Resource Guide for Students at Klein ISD 1:1 Campuses.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Parental controls 101. What are they? Tools to help parents regulate their children’s internet use. You can set them: At network level. On your child’s.
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
What’s a mobile app? A mobile app is a software program you can download and access directly using your phone or another mobile device, like a tablet.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
This is the IT website. Submit a service request, find out hours and locations, reset your password and search for help. IT has service points across campus.
FriendFinder Location-aware social networking on mobile phones.
How Your Customers Will Pay Online & by Phone
Knut S-C Öjermark K enmark International Pleasanton Senior Center.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
WIDESCREEN PRESENTATION Tips and tools for creating and presenting wide format slides.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
IT Security Awareness Day October 19, 2016
Internet Safety Awareness
Mobile Operating Systems
DATA SECURITY FOR MEDICAL RESEARCH
Hotspot Shield Protect Your Online Identity
VPN Joshua Turner.
Security and Privacy in Social Networks
for the Final Stage of our Merger:
TECHNOLOGY GUIDE THREE
How to Set Up and Use Your Filimin Long Distance Touch Lamp
Online password manager By: Anthony diveronica
Two-factor authentication
Thanks for being a Hero Customer!
IbVPN: Ensures Your Online Safety and Access Blocked Websites
Multifactor Authentication
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Easier Internet Browsing and Better Password Security
Digital $$ Quiz Test your knowledge.
How to Set up Remote Access to Personal U: drive
Chapter 3: Protecting Your Data and Privacy
Unit# 5: Internet and Worldwide Web
Managing and Monitoring Screen Time
Digital Privacy Workshop 101
G061 - Network Security.
Getting Started With LastPass Enterprise
Presentation transcript:

30 Apps for Librarians Sana Moulder & Bryson Kopf

-What does mobile mean today? 64% of American adults now own a smartphone of some kind, up from 35% in the spring of 2011.American adults now own a smartphone of some kind, up from 35% in the spring of Smartphone ownership is especially high among younger Americans (85% of those aged 18-29), as well as those with relatively high income and education levels.

Users are turning to mobile devices as they navigate a wide range of life events -62% of smartphone owners have used their phone in the past year to look up information about a health condition. -57% have used their phone to do online banking. -44% have used their phone to look up real estate listings or other information about a place to live. -43% have used their phone to look up information about a job. information about a job. -40% to look up government services or information. -30% to take a class or get educational content. -18% to submit a job application.

Privacy & Security

Lost and Stolen Devices -Consumer Reports believes that over 3 million smartphones are stolen each year. Their very nature makes them attractive to those prone to thievery because they are small, easily concealable, carry a ton of valuable information on them and they’re shockingly easy to jailbreak or fence. -Take Steps to protect your data and device: 1. Set a screen lock 2. Make sure your data is backed up 3. Encrypt your device 4. Turn on 2-factor authentication (more on this in a minute) 5. Only download from a trusted source

Lost and Stolen Devices, Continued If you lose the device, there are apps you can use to get it back or at least disable it: 1.Android Device manager: A Google app that allows you to track and secure your devices remotely. You can remotely track your devices, cause them to ring, change the lock code, or completely wipe them. 2.On Apple devices, use iCloud and Find my iPhone to track the phone. You can also turn on “lost mode,” which will remotely lock your phone and suspend Apple Pay.

Lost and Stolen Devices, Continued -Two-factor authentication (2FA) adds a second level of authentication to an account log-in. When you have to enter only your username and one password, that's considered a single-factor authentication. 2FA requires the user to have two out of three types of credentials before being able to access an account. The three types are: 1.Something you know, such as a personal identification number (PIN), password or a pattern 2.Something you have, such as an ATM card, phone, or fob 3.Something you are, such as a biometric like a fingerprint or voice print

Secure Web Browsing -VPN (Virtual Private Network), is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. -TOR is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than six thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis.free softwareanonymous communicationnetwork surveillancetraffic analysis - (android) - (iOS devices)

Secure Web Browsing, Continued -Ghostery ( is a browser add-on that shows you all the companies that are tracking you when you visit a website, and allows you to block them from collecting data, if you choose. -Duckduckgo ( is an Internet search engine that emphasizes protecting searchers’ privacy and avoiding the filter bubble of personalized search results. DuckDuckGo distinguishes itself from other search engines by not profiling its users and by deliberately showing all users the same search results for a given search term. DuckDuckGo emphasizes getting information from the best sources rather than the most sourceshttps:// engine filter bubble

App Discovery Quixey: A search engine for apps. You can choose a platform, such as iOS or Android, and enter what you want the app to be able to do.

Password Managers -LastPass: (Android and iOS): Passwords in LastPass are protected by a master password, encrypted locally, and synchronized to any other browser. LastPass has a form filler that automates password entering and form filling. It also supports password generation, site sharing and site logging -1Password: (Android and iOS): It remembers all of your website passwords for you so you never have to enter them in. All you need to remember is one password (hence the name), which will give you access to all of your other passwords. Once you add a password, your web browser can log you into your favorite sites using only that one password you made. It also can keep track of secure notes, passport numbers, medical information, frequent flier numbers, and even your credit cards.