British Library Still In Recovery

The British Library has confirmed that Public Lending Right (PLR) statements and payments will be made in advance of the March statutory deadline, following concerns that these could have been affected by a crippling cyber attack.

In a statement, chief executive Sir Roly Keating confirmed that "work-around arrangements" have been put in place to ensure that payments will be made to authors and illustrators on time.

"Last month we shared timings for statements and payments to authors, illustrators and others who are entitled to PLR, in both Ireland and the UK, and last week we issued Irish PLR statements, in line with this revised timetable," Keating said.

"Although we usually issue both statements and payments a few weeks ahead of the current timeline, I hope this confirmation provides some reassurance to those who may have been concerned about the potential impact of the cyber attack on their PLR payments."

JK Rowling could be among famous authors whose postal addresses and other private details may be on the Dark Web following the cyber attack on the Libaray. 

Concerns are growing among the UK’s literary elite after the British Library confirmed that the hackers may also have obtained data relating to the Public Lending Right (PLR), which processes payments for the lending of authors’ books from UK libraries.

There is currently no evidence that any PLR bank details were compromised in the attack, however, the Library is  not able to confirm this with complete certainty until forensic analysis of all compromised data, systems, and network is finished.

The news comes after the restoration of the library’s main catalogue, as well as increased access to its special collections, as it recovers from the major outage caused by a ransomware attack last year. The recovery of access to the collection has required "various manual workarounds", and a timeline for the restoration of other key services will be released soon.

"As with the interim arrangements for ordering material held at St Pancras, there may be more of a manual or hybrid element than would normally be the case," Keating added, "but our priority is to restore access to our collection to everyone who needs it".

The Bookseller     |     British Library     |     Telegraph     |     LinkedIn     |     Society Of Authors   

|    Computer Weekly

Image: Ave Calvar

You Might Also Read:

British Library Pays A High Price To Recover From A Cyber Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« Malicious Microsoft Cloud Account Takeover Campaign
Humanoid Robotics: The Next Step For Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

InfoSec World

InfoSec World

InfoSec World conference and expo covers all aspects of information security with a broad agenda of sessions on key security issues.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

IronScales

IronScales

IronScales combines human intelligence with machine learning to automatically prevent, detect and respond to email phishing attacks.

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

Bio-Morphis

Bio-Morphis

Bio-Morphis Reflex solution is a paradigm shift in the approach to information systems security.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

Secret Intelligence Service (SIS - MI6)

Secret Intelligence Service (SIS - MI6)

The UK’s Secret Intelligence Service, also known as MI6, has three core aims: stopping terrorism, disrupting the activity of hostile states, and giving the UK a cyber advantage.

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Contextual Security Solutions

Contextual Security Solutions

Contextual Security Solutions is a leading provider of penetration testing services and IT security & compliance audits.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.

SecondSight

SecondSight

SecondSight’s Vertical AI embodies a full-spectrum approach to cyber insurance, facilitating accurate digital risk profiling.