<div dir="ltr"><div><div><div dir="ltr"><div dir="ltr"><div dir="ltr">
<table bgcolor="#ffffff" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td align="left" valign="top">
<table cellpadding="0" cellspacing="0">
<tbody>
<tr>
<td style="border-top:0px solid rgb(0,0,0);border-bottom:1px solid rgb(255,255,255);background-color:rgb(255,255,255);text-align:center" align="center"><span style="font-size:10px;color:rgb(96,96,96);line-height:200%;font-family:verdana;text-decoration:none">Email
not displaying correctly? <a href="http://www.oplin.org/4cast/" style="font-size:10px;color:rgb(0,0,255);line-height:200%;font-family:verdana;text-decoration:none" target="_blank">View
it in your browser.</a></span></td>
</tr>
<tr>
<td style="border-top:0px solid rgb(51,51,51);border-bottom:0px solid rgb(255,255,255);background-color:rgb(255,255,255)">
<center><a><img src="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickheader.jpg" title="OPLIN" alt="OPLIN 4Cast" align="middle" border="0"></a></center>
</td>
</tr>
</tbody>
</table>
<table style="width:763px;height:877px" bgcolor="#ffffff" cellpadding="20" cellspacing="0">
<tbody>
<tr>
<td style="font-size:12px;color:rgb(0,0,0);line-height:150%;font-family:trebuchet ms" background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg" bgcolor="#ffffff" valign="top">
<p>
<span style="font-size:20px;font-weight:bold;color:rgb(0,0,0);font-family:arial;line-height:110%">OPLIN 4cast #448: Pro-am cybersecurity</span><br>
<span style="font-size:11px;font-weight:normal;color:rgb(102,102,102);font-style:italic;font-family:arial">July 29th, 2015</span></p>
<p style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><img align="left" src="http://www.oplin.org/4cast/wp-content/uploads/2015/07/cybersecurity.png" alt="cybersecurity" width="130" height="110">Last week, while this blog was scaring you with tales of hackers-for-hire, the Google folks were presenting some interesting <a href="https://www.usenix.org/system/files/conference/soups2015/soups15-paper-ion.pdf" target="_blank">security practices research</a> [pdf] at the Symposium on Usable Privacy and Security (SOUPS) in Ottawa, Canada. The researchers conducted a survey of 231 security "experts," defined as someone who had at least five years experience working in or studying computer security, and 294 non-experts recruited through Amazon's Mechanical Turk. There were some very clear differences between the responses of the experts and the non-experts.
</p>
<div> </div>
<ul style="text-align:left">
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://arstechnica.com/security/2015/07/what-amateurs-can-learn-from-security-pros-about-staying-safe-online/" target="_blank">What amateurs can learn from security pros about staying safe online</a> (Ars Technica | Dan Goodin) "A survey found stark discrepancies in the ways the two groups reported keeping themselves secure. Non security experts listed the top security practice as using antivirus software, followed by using strong passwords, changing passwords frequently, visiting only known websites, and not sharing personal information. Security experts, by contrast, listed the top practice as installing software updates, followed by using unique passwords, using two-factor authentication, choosing strong passwords, and using a password manager."</li>
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://googleonlinesecurity.blogspot.com/2015/07/new-research-comparing-how-security.html" target="_blank">New research: Comparing how security experts and non-experts stay safe online</a> (Google Online Security Blog | Iulia Ion, Rob Reeder, and Sunny Consolvo) "More broadly, our findings highlight fundamental misunderstandings about basic online security practices. Software updates, for example, are the seatbelts of online security; they make you safer, period. And yet, many non-experts not only overlook these as a best practice, but also mistakenly worry that software updates are a security <em>risk</em>."</li>
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://www.npr.org/sections/alltechconsidered/2015/07/23/425502893/trying-to-keep-your-data-safe-youre-probably-doing-it-wrong" target="_blank">Trying to keep your data safe? You're probably doing it wrong</a> (NPR All Tech Considered | Aarti Shahani) "There's a similarly stark gap when it comes to antivirus - the software that has long been hailed as the all-purpose cleaner, the rubbing alcohol of the Internet. Forty-two percent of the non-experts surveyed say products like McAfee and Norton are key. But among the experts like [Gerhard] Eschelbeck [Google Vice President for Security Engineering], just 7 percent agree. 'Antivirus has absolutely its place. But it's not like the only one solution that people can and should rely upon,' Eschelbeck says."</li>
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://www.informationweek.com/it-life/online-security-how-the-experts-keep-safe/d/d-id/1321465" target="_blank">Online security: How the experts keep safe</a> (InformationWeek | Thomas Claburn) "A third point of differentiation between security experts and non-experts is the use of two-factor authentication. Eighty-nine percent of security experts polled said they used two-factor authentication, compared to 69% of non-experts. Some 12% of non-experts said they didn't know whether they use two-factor authentication - which probably means they don't."</li>
</ul>
<div style="text-align:left"> </div>
<p style="text-align:left;font-size:20px;font-family:arial;line-height:110%"><small><strong><em>Articles from <a href="http://ohioweblibrary.org" target="_blank">Ohio Web Library</a>:</em></strong></small><br>
</p>
<div style="text-align:justify;font-size:16px;font-family:arial;line-height:110%">
<ul>
<li><a href="http://search.ebscohost.com.proxy.oplin.org/login.aspx?direct=true&db=cmh&AN=99233743&site=chc-live" target="_blank">Multi-factor authentication-It's not just buying another lock.</a> (<em>Computers in Libraries</em>, Nov. 2014, p.26-27 | Jessamyn West)</li>
<li><a href="http://search.ebscohost.com.proxy.oplin.org/login.aspx?direct=true&db=cmh&AN=103232988&site=chc-live" target="_blank">Personal online security.</a> (<em>Online Searcher</em>, May/June 2015, p.38-43 | Edward Vawter)</li>
<li><a href="http://search.ebscohost.com.proxy.oplin.org/login.aspx?direct=true&db=buh&AN=103441792&site=ehost-live" target="_blank">Passwords and the evolution of imperfect authentication.</a> (<em>Communications of the ACM</em>, July 2015, p.78-87 | Joseph Bonneau, Cormac Herley, Paul C. Van Oorschot, and Frank Stajano)</li>
</ul>
</div>
<div style="text-align:left"> </div>
</td>
</tr>
<tr>
<td background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg" valign="top" width="760"><span style="font-size:10px;color:rgb(96,96,96);line-height:100%;font-family:verdana">
<hr>
<div style="text-align:justify">The <strong><em>OPLIN
4cast</em></strong>
is a weekly compilation of
recent headlines, topics, and trends that could impact public
libraries. You can subscribe to it in a variety of ways, such as: <br>
</div>
<div style="text-align:left"> </div>
<ul>
<li style="text-align:justify"><strong>RSS feed.</strong>
You
can receive the OPLIN 4cast
via RSS feed by subscribing to the following URL:
<a href="http://www.oplin.org/4cast/index.php/?feed=rss2" target="_blank">http://www.oplin.org/4cast/index.php/?feed=rss2</a>. </li>
<li style="text-align:justify"><strong>Live Bookmark.</strong>
If you're using the Firefox
web browser, you can go to the 4cast website
(<a href="http://www.oplin.org/4cast/" target="_blank">http://www.oplin.org/4cast/</a>) and click on the orange "radio wave" icon
on the right side of the address bar. In Internet Explorer 7, click on
the same icon to view or subscribe to the 4cast RSS feed. </li>
<li style="text-align:justify"><strong>E-mail.</strong>
You
can have the OPLIN 4cast
delivered via e-mail (a'la OPLINlist and OPLINtech) by subscribing to
the 4cast mailing list at
<a href="http://mail.oplin.org/mailman/listinfo/OPLIN4cast" target="_blank">http://mail.oplin.org/mailman/listinfo/OPLIN4cast</a>. </li>
</ul>
</span> </td>
</tr>
<tr>
<td style="border-top:0px solid rgb(255,255,255);background-color:rgb(255,255,204)" background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickfooter.jpg" valign="top" width="760"> <br>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
<div dir="ltr"><br></div></div></div></div></div></div>
</div>