British Library Still In Recovery

The British Library has confirmed that Public Lending Right (PLR) statements and payments will be made in advance of the March statutory deadline, following concerns that these could have been affected by a crippling cyber attack.

In a statement, chief executive Sir Roly Keating confirmed that "work-around arrangements" have been put in place to ensure that payments will be made to authors and illustrators on time.

"Last month we shared timings for statements and payments to authors, illustrators and others who are entitled to PLR, in both Ireland and the UK, and last week we issued Irish PLR statements, in line with this revised timetable," Keating said.

"Although we usually issue both statements and payments a few weeks ahead of the current timeline, I hope this confirmation provides some reassurance to those who may have been concerned about the potential impact of the cyber attack on their PLR payments."

JK Rowling could be among famous authors whose postal addresses and other private details may be on the Dark Web following the cyber attack on the Libaray. 

Concerns are growing among the UK’s literary elite after the British Library confirmed that the hackers may also have obtained data relating to the Public Lending Right (PLR), which processes payments for the lending of authors’ books from UK libraries.

There is currently no evidence that any PLR bank details were compromised in the attack, however, the Library is  not able to confirm this with complete certainty until forensic analysis of all compromised data, systems, and network is finished.

The news comes after the restoration of the library’s main catalogue, as well as increased access to its special collections, as it recovers from the major outage caused by a ransomware attack last year. The recovery of access to the collection has required "various manual workarounds", and a timeline for the restoration of other key services will be released soon.

"As with the interim arrangements for ordering material held at St Pancras, there may be more of a manual or hybrid element than would normally be the case," Keating added, "but our priority is to restore access to our collection to everyone who needs it".

The Bookseller     |     British Library     |     Telegraph     |     LinkedIn     |     Society Of Authors   

|    Computer Weekly

Image: Ave Calvar

You Might Also Read:

British Library Pays A High Price To Recover From A Cyber Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« Malicious Microsoft Cloud Account Takeover Campaign
Humanoid Robotics: The Next Step For Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

HumanFirewall

HumanFirewall

HumanFirewall makes it possible for every individual to take part in securing their organisation. With HumanFirewall, achieving security has never been easier.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

Squad

Squad

Squad provides leading expertise to ensure protection against the most complex cyber threats. Combining the best practices of DevOps and Cybersecurity, we are committed to create a secured cyber space

The ATOM Group

The ATOM Group

ATOM builds and secures technology for regulated industries. We design and build for a future we can all trust.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIS Solutions

MIS Solutions

MIS Solutions is a managed cloud and IT security partner making technology work for you.

Whalebone

Whalebone

Whalebone develop user-centric, no-installation network security products for telcos, internet service providers, enterprises, public institutions, and governments.