British Library Still In Recovery

The British Library has confirmed that Public Lending Right (PLR) statements and payments will be made in advance of the March statutory deadline, following concerns that these could have been affected by a crippling cyber attack.

In a statement, chief executive Sir Roly Keating confirmed that "work-around arrangements" have been put in place to ensure that payments will be made to authors and illustrators on time.

"Last month we shared timings for statements and payments to authors, illustrators and others who are entitled to PLR, in both Ireland and the UK, and last week we issued Irish PLR statements, in line with this revised timetable," Keating said.

"Although we usually issue both statements and payments a few weeks ahead of the current timeline, I hope this confirmation provides some reassurance to those who may have been concerned about the potential impact of the cyber attack on their PLR payments."

JK Rowling could be among famous authors whose postal addresses and other private details may be on the Dark Web following the cyber attack on the Libaray. 

Concerns are growing among the UK’s literary elite after the British Library confirmed that the hackers may also have obtained data relating to the Public Lending Right (PLR), which processes payments for the lending of authors’ books from UK libraries.

There is currently no evidence that any PLR bank details were compromised in the attack, however, the Library is  not able to confirm this with complete certainty until forensic analysis of all compromised data, systems, and network is finished.

The news comes after the restoration of the library’s main catalogue, as well as increased access to its special collections, as it recovers from the major outage caused by a ransomware attack last year. The recovery of access to the collection has required "various manual workarounds", and a timeline for the restoration of other key services will be released soon.

"As with the interim arrangements for ordering material held at St Pancras, there may be more of a manual or hybrid element than would normally be the case," Keating added, "but our priority is to restore access to our collection to everyone who needs it".

The Bookseller     |     British Library     |     Telegraph     |     LinkedIn     |     Society Of Authors   

|    Computer Weekly

Image: Ave Calvar

You Might Also Read:

British Library Pays A High Price To Recover From A Cyber Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« Malicious Microsoft Cloud Account Takeover Campaign
Humanoid Robotics: The Next Step For Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

Lynx

Lynx

Lynx provides high added value services in the area of information systems security and ICT infrastructure building.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

LuJam Cyber

LuJam Cyber

LuJam Cyber is a cybersecurity company that provides protection to SME Networks.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

ESC - Enterprise Security Center

ESC - Enterprise Security Center

ESC is a system house specializing exclusively in IT security - Security Implementation & Optimization, Operations, Managed Security Services.

Dr Web

Dr Web

Since 1992 the Russian anti-virus Dr.Web has been helping companies to keep their digital assets protected and operate in a secure digital environment.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.

Idenhaus Consulting

Idenhaus Consulting

Idenhaus specializes in Cybersecurity and Identity Management (IAM) Consulting.

Unified Infotech

Unified Infotech

Unified Infotech is a trusted partner for IT and software solutions dedicated to empowering businesses.