If you read today’s headlines about security breaches, you might be thinking of going back to fax machines and snail mail. Or you might be assuming that privacy is dead and we may as well get used to it (and you have nothing to hide, right?)

While there is no such thing as foolproof security and privacy, there is a middle ground that you can find by understanding and using particular techniques.

Have you ever wondered about the following questions?

  • Is your laptop or smartphone’s traffic being harvested when on public wi-fi?
  • What’s the best thing to do if your device is lost or stolen?
  • Is your data safely backed up?
  • Should you trust a password manager?
  • Can criminals hold your data captive and ask for ransom?
  • How can you make theft of your identity less likely?
  • Is your laptop camera or microphone recording without you knowing it?
  • Are you giving away information for targeted advertising?
  • How easy is it for anyone to see all of your search engine history?
  • Should you use encrypted messaging and email? How?

If so, you can learn about the answers in my upcoming webinar (hosted by ALA): Cyber Security and Privacy: Protecting Yourselves and Your Users. For each question we’ll look at media hype compared to expert opinions and show what you can do to protect yourself.

Outcomes

  • You’ll understand more about several technologies that protect your privacy and security.
  • You’ll have a list of actions you can take to make your own data more secure and private.
  • You’ll have the basis for creating a workshop of your own that you can offer to your library community.

Join us on July 6!