Skip to main content

The Tech Landscape & Libraries

On this week’s Princh Library Blog post we have guest writer Nick Tanzi, author and library technology consultant, sharing his thoughts on the current technological landscape and how libraries can best adapt to it. To say that 2020 was a year of disruption and change would be an understatement. The COVID-19 pandemic has caused pervasive […]

10 Backend Security Risks and 1

And keep in mind, most security risks occur due to misconfigurations, or even the simple lack of scanning. That’s why, in the same way that we recently explored Frontend Security Risks and Best Practices, we’re going to explore some of the most common, yet dangerous, risks within your web application’s backend security. 10 Popular Backend […]

Microsoft Patch Tuesday, March1

On the off chance you were looking for more security to-dos from Microsoft today…the company released software updates to plug more than 82 security flaws in Windows and other supported software. Ten of these earned Microsoft’s “critical” rating, meaning they can be exploited by malware or miscreants with little or no help from users. Top […]

Warning the World of a Ticking1

Globally, hundreds of thousand of organizations running Exchange email servers from Microsoft just got mass-hacked, including at least 30,000 victims in the United States. Each hacked server has been retrofitted with a “web shell” backdoor that gives the bad guys total, remote control, the ability to read all email, and easy access to the victim’s […]

Trojans: Definition, Types and1

On our quest to revisit nearly forgotten, yet still relevant, cyber threats—such as brute force attacks and man-in-the middle attacks—it’s time to dive into trojans. How and why do they still persist? How can organizations protect themselves in the wake of so many new and reinvented campaigns? For a thorough examination, let’s start at the […]

At Least 30,000 U.S. Organizat1

At least 30,000 organizations across the United States — including a significant number of small businesses, towns, cities and local governments — have over the past few days been hacked by an unusually aggressive Chinese cyber espionage unit that’s focused on stealing email from victim organizations, multiple sources tell KrebsOnSecurity. The espionage group is exploiting […]

Three Top Russian Cybercrime F1

Over the past few weeks, three of the longest running and most venerated Russian-language online forums serving thousands of experienced cybercriminals have been hacked. In two of the intrusions, the attackers made off with the forums’ user databases, including email and Internet addresses and hashed passwords. Members of all three forums are worried the incidents […]

Microsoft: Chinese Cyberspies 1

Microsoft Corp. today released software updates to plug four security holes that attackers have been using to plunder email communications at companies that use its Exchange Server products. The company says all four flaws are being actively exploited as part of a complex attack chain deployed by a previously unidentified Chinese cyber espionage group. The […]

Payroll/HR Giant PrismHR Hit b1

PrismHR, a company that sells technology used by other firms to help more than 80,000 small businesses manage payroll, benefits, and human resources, has suffered what appears to be an ongoing ransomware attack that is disrupting many of its services. Hopkinton, Mass.-based PrismHR handles everything from payroll processing and human resources to health insurance and […]

Building a Career in Incident 1

Cybersecurity is one of the fastest-growing industries, while cybersecurity professionals are some of the most valuable workers of any organization, regardless of the industry. There is some talk of a cybersecurity skills gap that claims a shortage of professionals, but is that true? Or is gatekeeping dictating unrealistic expectations for entry-level positions, making it harder […]

Is Your Browser Extension a Bo1

A company that rents out access to more than 10 million Web browsers so that clients can hide their true Internet addresses has built its network by paying browser extension makers to quietly include its code in their creations. This story examines the lopsided economics of extension development, and why installing an extension can be […]

A Disproportionate Pandemic

Jack Miller dusts shelves at the main location of Gail Borden Public Library District in Elgin, Illinois, pre-pandemic. Photo: Gail Borden Public Library District in Elgin, Illinois Before COVID-19 came along, 18-year-old Jack Miller, who has autism, visited the main location of Gail Borden Public Library District (GBPLD) in Elgin, Illinois, three times a week. […]

Emerging Leaders: Where Are Th1

The American Library Association’s (ALA) annual Emerging Leaders (ELs) program recognizes the best and brightest new leaders in the library profession, allowing them to get on a fast track at the Association by participating in planning groups, networking, gaining an inside look at ALA structure, and serving in leadership capacities early in their careers. At […]

The Road to Normal

Valerie Wagley, counselor at Fair Oaks Elementary School in Cobb County, Georgia, reads to kids at a bookmobile stop in summer 2020. Photo: Kelli Wood When Goochland County (Va.) Public Schools abruptly stopped in-person learning at the onset of the COVID-19 pandemic last March, school librarians Zoe Parrish, Sarah Smith, and Susan Vaughn worried that […]

Users at the Center of Everyth1

Photo: ©Monkey Business/Adobe Stock In her professional life, coauthor Lauren Stara has worked for three architectural firms, one zoo, one multinational corporation, two museums, five universities, three public libraries, and one state library agency. She has also done freelance work or consulting in both architecture and librarianship. Over those 32 years, she has worked in […]