Download presentation
Presentation is loading. Please wait.
Published byGinger Osborne Modified over 8 years ago
1
Make your Library a Privacy and Security Resource M Ryan Hess Senior Librarian for Information Technology Palo Alto City Library
2
It’s a Dangerous World Spotty-faced Hackers International Criminals “Rogue Nations” Intelligence Services Data Mining Companies
3
Bad Actors
4
We’ve Got a Problem Operation Aurora Hack, 2009 Gmail and Google, Adobe, Rackspace and dozens of other firms Target and Home Depot Hacks, 2014 96 million consumers Federal Government Employee Hack, 2015 21.5 million federal employees
5
A New Library Role Educating the public on risk avoidance –Genius Squad Services –Reference Desk Interactions –Programming –Self-help resources
6
Tools & Best Practices –Password Management –Encrypted Communication –Safe Browsing –Virtual Private Networks (VPNs) –Cautious Use of Social Networks, Apps and Devices
7
Password Management 1.123456 2.password 3.12345678 4.qwerty 5.12345 6.123456789 7.Football 8.1234 9.1234567 10.baseball Source: http://gizmodo.com/the-25-most-popular-passwords-of-2015-were-all-such-id-1753591514 Most Common Passwords, 2015
8
Password Management KeePass LastPass Dashlane 1Password Roboform Source: http://lifehacker.com/5529133/five-best-password-managers
9
Encrypted Communication End-to-end Encryption Services –ProtonMail –Tutanota –iMessage (Apple)* –NOT WhatsApp** * If not using iCloud ** Electronic Frontier Foundation reports WhatsApp is terrible for privacyreports
10
Safe Browsing Issues Web Trackers Cookies Password Management Malicious websites Malicious plugins panopticlick.eff.org
11
Safe Browsing Tools Firefox Avast, Ghostery, Disconnect, EFF’s Privacy Badger Startpage, Ixquick or DuckDuckGo AdBlocker
12
Virtual Private Networks (VPN) 1.Private Internet Access 2.TorGuard 3.CyberGhost VPN Source: http://lifehacker.com/5935863/five-best-vpn-service-providers
13
Cautious Use of Social Networks, Apps and Devices –Scan the Terms of Service –Search “[App Name] and privacy” –Check the EFF’s “Who’s Got Your Back Report” –Ask: Is the company behind the device, service or network a data mining company?
14
Trends to Watch Apple vs. FBI ProtonMail vs. ??? Library vendors (PINs, encryption, etc.) FCC vs Carrier Supercookies
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.