Two New Books for Privacy

By Lance Hickerson, Reference Department

61McfPOZDqLAs discussed in my previous article, it’s important to keep your information safe. In addition to good advice online, there are some new books in the library that might be of interest to our patrons. One is entitled, 99 Things You Wish You Knew Before … Your Identity Was Stolen (The 99 Series, 2014) by Robert Siciliano. The author provides clear explanations concerning types of identity theft as well as ways to protect yourself online.

He covers “99 Things” in the form of questions, like, for instance question # 18: “How would Cybercriminals Go After Me?” His answer includes the following:

  • If the wireless Internet connection in your home or office is not secure, you’re vulnerable.
  • If the operating system on your computer is not up to date, you’re vulnerable.
  • If the browser on your computer is outdated, you’re vulnerable.
  • If, while on your own computer, you visit risky websites or online gaming sites that are hosted in foreign countries, you’re vulnerable.
  • If you download pirated software, movies, or music, you’re vulnerable.
  • If you engage in illicit activities on the Internet, you’re vulnerable.
  • Even if all of your security software is updated, if you enter credit card information into a website that is not properly secured, you’re vulnerable.
  • If you enter your Social Security Number into a website that is not properly secured, you’re vulnerable.
  • If you provide you data to a company that believes they are fully secure, but whose employees might open phishing email that can compromise their entire network, you’re vulnerable”   (pp. 30-31).

Throughout the book, the author relates a wealth of data, like the following regarding simple passwords: “When 32 million passwords were exposed in a breach last year, almost 1 percent of victims were using 123456. The next most popular password was 12345. Other common choices are 111111, princess, qwerty, and abc123. Avoid these types of passwords, which are easily guessed” (p. 166).

51V1ngQ19JL._SY344_BO1,204,203,200_A second new book of interest to our patrons is Cyber self-defense : expert advice to avoid online predators, identity theft, and cyberbullying (Lyons Press, 2014) by Alexis Moore and Laurie Edwards. The book is rich in practical insight and personality profiles helping readers identify persons of concern. In discussing “How to Avoid Becoming a Cyberattack Victim,” she gives several pages of helpful action steps. Among her suggestions:

  • Install spyware protection.
  • Create a junk mail account.
  • Use special screen and email names.
  • Do not fill out all the fields when registering online.
  • Read and monitor privacy policies.
  • Ask friends and family to be cautious about posting your private information.
  • Choose unusual answers for your security questions.
  • Don’t open emails or click on links from strangers.
  • Use only a secure, designated PC for online banking.
  • If you think you have a cyberstalker, move fast. (pp. 161 – 165).

Author Robert Siciliano above points out two important numbers: the average time victims spend repairing their lives from new fraudulent accounts is 165 hours, while the average time victims spent repairing their existing accounts is 58 hours (p. 9). Just a few minutes of prevention following tips from these two books could save hours of cure.

Advertisements

About WCPLtn

The Williamson County Public Library System seeks to meet the recreational, educational, and information needs of county patrons through: a significant collection of digital and print materials housed at a network of countywide locations headquartered in Franklin; extensive personal computer and related technology; and diverse and interesting programs targeted to various age groups.

Posted on June 5, 2015, in Book Reviews, Hot Topics and tagged , , , , , , . Bookmark the permalink. Leave a comment.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: