A lot is known about passwords. Most are short, simple, and pretty easy to crack. But much less is known about the psychological reasons a person chooses a specific password. We’ve analyzed the password choices of 10 million people, from CEOs to scientists, to find out what they reveal about the things we consider easy to remember and hard to guess.
IT Security For Libraries
IT Security For Libraries
Most of us get to be thoroughly relieved that our emails weren't in the Ashley Madison database. But don’t get too comfortable. Whatever secrets you have, even the ones you don’t think of as secret, are more likely than you think to get dumped on the Internet. It's not your fault, and there’s largely nothing you can do about it.
Welcome to the age of organizational doxing.
The ALA lost control of its Facebook page over the weekend so this seems like a pretty good time to review IT Security! Any size small or midsized organization is difficult, if not impossible to secure. It's very easy to overlook things and leave ourselves vulnerable to things like this.
Join Blake Carver from LYRASIS and Alison Macrina from the Library Freedom Project to learn strategies for security from digital surveillance. We'll teach tools that keep data safe inside the library and out -- securing your network, website, and PCs, and tools you can teach to patrons in computer classes. We’ll tackle security myths, passwords, tracking, malware, and more, covering a range of tools from basic to advanced, making this session ideal for any library staff.
Data breaches increased 49% with almost 1 billion data records compromised in 1,500 attacks in 2014 – a 78% increase in the number of data records either lost or stolen in 2013, a new report by digital security firm Gemalto said. The Netherlands-based firm said about 575 million records were compromised in 2013.
Identity theft was by far the largest type of attack, with 54% of the breaches involving the theft of personal data, up from 23% in 2013.
STAY SAFE WHILE YOU’RE ONLINE
It’s easy, in theory, to keep your PC safe. It all comes down to three things:
Keep everything patched and updated.
Never trust anything.
Use good passwords.
If you can plug it in or connect it to a network, your device—no matter what it is—can be harnessed by someone else. And that someone doesn’t have to be a Chinese superhacker to do some serious damage with it, either on purpose or by accident. It can be your Uncle Roger, who doesn’t have his new iPhone figured out and is cluelessly turning your lights on and off via your Belkin WeMo.
Phishing attacks targeting academia aren’t the most high-profile of attacks, though they’re more common than you might think. Student populations in themselves constitute a sizeable pool of potential victims for money mule recruitment and other job scams, in fact anything that promises an easy supplemental income, unfeasibly cheap or free trendy gadgetry, and so on.
This week's episode looks around the LISHost galaxy while looking at some ambiguous information in a speculative manner.
- LISWire: Worch Memorial Public Library Joins COOL and Goes Live on Evergreen
- Pwnie Express: Pwn Plug Elite
- Wired: The Little White Box That Can Hack Your Network
- The Verge: Wikileaks claims Aaron Swartz was an ally and possible source, breaking anonymity
- CNET: WikiLeaks says Aaron Swartz may have been a 'source'
- The Guardian: Libraries crisis set to get 'much worse' this year
- Galileo 0.012 released!
Download here (MP3) (Ogg Vorbis), or subscribe to the podcast (MP3) to have episodes delivered to your media player. We suggest subscribing by way of a service like gpodder.net. A way to send gifts of replacement hardware to Erie Looking Productions is available here via Amazon, as always.
This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 United States License. To view a copy of this license, visit