Keeping Safe in a Digital World
How Not to be Hacked
Malware, Phishing, Hacking, Ransomware – oh my! Learn about the threats to you, your users and your library. During this session, we will explore the threats to online security and discuss solutions that can be implemented at any level. Most importantly, we will look at how we can educate our users on current threats and safety
Date: December 5th, 10AM
Presenter: Diana Silveira
Webinar December 5, 2017 10 AM
- create policies. e.g. changing psw routinely
- USB blockers for public computers (public libraries). like skimmers on gas stations
- do not use admin passwords
- software and firmware updates.
- policy for leaving employees
- HTTP vs HTTPS
- Cybersecurity KNowledge Quiz Pew research Center
more on hacking in this IMS blog
Edmodo Investigates Millions of User Accounts for Sale on Dark Web
By Sri Ravipati 05/12/17
A hacker going by the name “nclay” claims to have stolen more than 77 million user accounts from Edmodo
LeakBase yesterday Tweeted that the top domains for the data breach include:
- @gmail.com, accounting for 19 percent of the accounts at 13,286,240;
- @hotmail.com, making up 10 percent of the accounts at 7,065,761; and
- @yahoo.com, at 8 percent with 6,074,901 accounts.
more on Edmodo in this IMS blog
How to defend against government hackers
By Mark Rockwell Mar 31, 2017
The 188-page “Challenging Government Hacking In Criminal Cases” report, released by the American Civil Liberties Union on March 30, addresses new amendments to Rule 41 of the Federal Rules of Criminal Procedure, which took effect last December.
Under the changes to criminal procedure rules, feds can remotely search computers in multiple jurisdictions with a single warrant. The rules are touted by law enforcement agencies as a way to streamline 100-year-old rules of criminal procedure
more on surveillance in this IMS blog
A Voice Cuts Through, and Adds to, the Intrigue of Russia’s Cyberattacks
more on Eastern European hackers in this IMS blog:
The prowess of these three crackers also underscores the need for end users to come up with better password hygiene. Many Fortune 500 companies tightly control the types of passwords employees are allowed to use to access e-mail and company networks, and they go a long way to dampen crackers’ success.