Information Security, Risk, and Getting in One’s Own Way

Let’s start this week’s Cybersecurity Awareness Month post with a phrase that will cause some of you to scream into the void and others to weep at your work desk quietly: Admin privileges on work computers. Rationing admin privileges on work computers is one example of an information security practice that both protects and puts …

Say What You Mean, or When Not to Use Certain Technical Terms

Welcome to the first week of Daylight Savings Time for most of our readers in the US! Now that we are short one hour of sleep, it’s the best time to start with a thought experiment. The following is an excerpt from a recent library technology conference poster proposal: “Patrons who visit an academic library …

Do These Three Things Today to Protect Your Patrons’ Privacy

Keeping track of the latest threats to patron data privacy and safety is easily a full-time job in quiet, uneventful times. Last week was neither quiet nor uneventful. From the possibility of increased cyber warfare in the coming weeks to the progression of anti-LGBTQIA+ and anti-CRT regulations in several US states, many library workers are …