Holiday Closure:

All Library locations will be closed
Thursday, Nov. 27 for Thanksgiving

Search
Small business attacks cybercrime
Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger
Julie E. Mehan.
Ely : IT Governance, 2008.
Includes bibliographical references and index.
     
Oracle E-business Suite security
John Abel.
New York : McGraw-Hill, c2007.
"Secure Oracle E-Business Suite within organizations and across the Internet using the in-depth guidance of this comprehensive volume. Oracle E-Business Suite Security covers everything from key infrastructure, technical, and functional information to cutting-edge auditing, cryptography, and VPD techniques. Real-world scenarios and tips throughout illustrate how to hacker-proof, audit, and troubleshoot your system. Plus, you'll get critical information on international regulatory standards, access to online code, and a blueprint of deployment topology."--BOOK JACKET.
     
Scams & swindles : phishing, spoofing, ID theft, Nigerian Advance Schemes, investment frauds, false sweethearts ; how to recognize and avoid financial rip-offs in the Internet age.
 
Los Angeles, CA : Silver Lake Publishing, c2006.
You've heard the terms. "Phishing." "Spoofing." "Nigerian Schemes." You have a vague idea about how these rip-offs work...but you'd rather not think about them too much. Bad idea.
     
Net crimes and misdemeanors : outmaneuvering web spammers, stalkers, and con artists
J.A. Hitchcock ; edited by Loraine Page.
Medford, N.J. : Information Today/CyberAge Books, 2006.
In this revised and expanded second edition of her popular book, cybercrime expert J.A. Hitchcock provides easy-to-follow and effective methods for dealing with spam, scams, viruses, hack attacks, identity theft, and many other online dangers. Hitchcock covers a broad range of abusive practices and presents dozens of fascinating real-life examples and success stories.
     

Security & privacy
The Better Business Bureau (BBB) has partnered with nationally-recognized security and privacy experts to create a new toolkit to help small business owners manage security and privacy challenges. It's called:

Security & Privacy--Made Simpler

St. Louis is home to thousands of small businesses.

If your company is one of them, you likely operate on a tight budget and employ only a small technology department. It is also likely that your company uses computers to send email, keep track of staff and customer information, and store private financial data and trade secrets.

What can you do to help minimize your vulnerability and protect your company?

These ten ideas will help you stop the person, be it a trusted employee or a clever hacker thousands of miles away, who is trying to alter or destroy your computer files.

  • Use antivirus, spyware, or other security software
  • Keep all software updated -- apply vendor's fixes (patches)
  • Routinely backup critical data and store securely
  • Close off email and file access as employees leave
  • Change passwords often and do not use same password for different accounts
  • Train staff on acceptable computer use and consequences of unacceptable use
  • Conduct random checks on computer use
  • Perform audits to assess how well security measures are working 
  • Hire a reputable company to analyze your current computer system for possible problems--check that company's credentials closely before you hire this company
  • Contact the police if you suspect tampering occurred

Small business owners must defend against cybercrime each day. The time spent combating identify theft, computer viruses, and Internet frauds can mean the difference between your business' success or failure.

Article by: St. Louis Public Library staff