Information Security, Risk, and Getting in One’s Own Way

Let’s start this week’s Cybersecurity Awareness Month post with a phrase that will cause some of you to scream into the void and others to weep at your work desk quietly: Admin privileges on work computers. Rationing admin privileges on work computers is one example of an information security practice that both protects and puts …

FUD and Reality – Information Security and Open Source Software

Librarians like our acronyms, but we’re not the only profession to indulge in linguistic gymnastics. The technology field is awash in acronyms: HTTP, AWS, UI, LAN, I/O, etc. etc. etc. One acronym you might know from working in libraries, though, is OSS – Open Source Software. Library technology is no stranger to OSS. The archived …

Cybersecurity Awareness Month News Update: School Cybersecurity, Passwords, and Crying “Hack!”

There’s never a dull moment in Cybersecurity Awareness Month, with last week being no exception. Here are some news stories you might have missed, along with possible implications and considerations for your library. K-12 cybersecurity bill signed into law You might remember reading about a new federal cybersecurity bill being signed into law. You remembered …

Is Library Scholarship a Privacy Information Hazard?

Library ethics, privacy, and technology collided again last week, this time with the publication of issue 52 of the Code4Lib Journal. In this issue, the editorial committee published an article describing an assessment process with serious data privacy and ethical issues and then explained their rationale for publishing the article in the issue editorial. The …