protect

How Can a Museum Best Protect Its Assets?

In this age of increasing hacks and cybercrime, the Norman Rockwell Museum has a lot of digital assets, museum operations data, and private patron data that need to be protected. Find out why Frank Kennedy, IT manager at the Rockwell museum, chose Veritas Backup Exec to be a key part of the museum's security strategy.

About the Museum

Norman Rockwell is one of the great iconic painters and illustrators of American life in the 20th century. His hundreds of covers for the Saturday Evening Post magazine alone are a national treasure. The Norman Rockwell Museum is located in Stockbridge, Massachusetts, where Rockwell spent the last part of his celebrated life. The museum started two years before Rockwell's death in 1978 and houses over 100,000 of his works and also those of other illustrators.

The museum now has 140,000 annual visitors, and 220,000 people view its traveling exhibitions each year. It also has an active website with more than 600,000 worldwide unique visitors per year.

The Museum's IT System

IT Manager Frank Kennedy is an IT department of one (plus an occasional contractor). He supports 90 staff and volunteers and is responsible for critical information security and data protection for the museum.

The museum's IT network consists of several large physical servers and many single-purpose virtual machines. The single-purpose virtual machines allow for emergency service without disrupting other departments.

Frank says, "Most of our enterprise software is procured via TechSoup, which makes it affordable to license so many servers! We do not have to make do with weak, low-budget software."

Digital Assets: Preserving Art over the Long Term

Frank Kennedy explains that digital assets are of increasing importance in the work of museums. There are high-resolution images or copies of art works that must be carefully stored to preserve work in its best condition. He says that digital versions are often irreplaceable, as when the original object is disintegrating or would be damaged by further handling.

The digital versions keep a faithful record of the art in its best state. The most sensitive objects of this museum include a collection of Rockwell's cellulose nitrate film negatives, which deteriorate over time.

The museum also has analog audio and video tape and motion picture film that deteriorates, as well as works on paper that degrade with exposure to light. Other crucial data for the museum includes databases for collection management, point of sale records, donor management, and email.

Frank's backup system is designed to be redundant on purpose. He says, "Protecting this data means keeping many copies in many places. Doing so becomes a big challenge when the size of the data becomes several terabytes. I use many layers of redundancy."

The Backup Crisis

As the museum's data got bigger and bigger, and server patches piled on, the museum's previous backup solution eventually became unstable. Frank reports that his backups were failing constantly and causing him stress in his careful, risk-based management approach. When he first went to get a new backup solution from TechSoup, he discovered that what he needed was not available.

He says, "The cost for the options I use would have been over $4,000 per year, unbudgeted. TechSoup responded to users' desperate cry and worked with Veritas to bring Backup Exec back to TechSoup! I can't even describe my relief. Veritas Backup Exec is better than ever. It is so stable that I get suspicious and have to go look just to be sure it's really working!"

Why the Norman Rockwell Museum Chose Backup Exec over Other Options

Frank told me that the license he gets from TechSoup includes every option his museum needs. These options and features include

  • Exchange Server backup
  • Unlimited media server backups
  • Unlimited agents for specific applications like VMware, Windows, Linux, and so on
  • Simplified disaster recovery
  • Protection against accidental deletion, damage, or overwriting
  • Storing backups to disk, network share, tape (any type), or cloud — or all four at once
  • Virtual machine snapshots that are viewable directly from the host's agent
  • A deduplication engine so backed-up data is as clean as possible
  • Backup retention periods that can be defined per job and per media server
  • An excellent graphical user interface
  • The status of every backed-up resource available at a glance
  • Sending an email to the admin when anything goes wrong
  • Running several jobs simultaneously (depending on server horsepower)

Advice for Museums and Other Organizations Considering Veritas Backup Exec

  • Backup Exec is powerful software geared toward backing up an entire network. It requires some study to do the installation and learn the software.
  • You don't get phone support with the charity licensing, so you need to be comfortable Googling for answers and working in the Veritas community support forum.
  • Frank recommends dedicating a strong server for running the software. He likes eight cores and 32 GB of RAM; hot-swappable, hot-growable RAID-5; fast network connectivity; and a very large uninterruptible power supply (UPS).
  • Avoid the temptation to install other services or applications on what seems to be a machine that is often idle.

In a Nutshell

Frank's experience is that "Veritas Backup Exec is the best, most reliable, most flexible, and versatile backup software you can get. Commit the needed resources to operate it, and you will be rewarded with peace of mind and business continuity. Your donors will be pleased that you are protecting their investment so carefully."

Image: Norman Rockwell Museum / All rights reserved / Used with permission




protect

Protecting Yourself from Malware with Better Password Security

4

In Week 1 of National Cybersecurity Awareness Month (NCSAM) we looked at spoofed emails, cybercriminals' preferred method of spreading malware. Today, in an effort to provide you with the best information out there to keep you safe online, we're hitting you with a double dose of cybersafety news.

Let's take look at the topics for Week 2 and 3 of National Cybersecurity Awareness Month: malware and password security. They're separate but related issues in the world of Internet crime prevention, and a better understanding of each is key to protecting your property and personal information in today's digital world.

Malware

Malware is an umbrella term used to describe software that is intended to damage or disable computers and computer systems. If you'd like, you can take a moment and watch this video on malware from Norton Security. But the best way to begin protecting yourself against this stuff is to learn about all the different types of malware that can affect your computer. There are tons, so we'll just go over the broader categories for now.

Viruses: Malicious bits of code that replicate by copying themselves to another program, computer boot sector, or document and change how a computer works. Viruses are typically attached to an executable file or program and spread once a user opens that file and executes it.

Worms: They're like viruses, but are different in terms of the way they're spread. Worms typically exploit a vulnerability or a weakness that allows an attacker to reduce a system's information assurance. Missed that last Windows update? You might be more vulnerable to worms.

Trojans: These look like legitimate pieces of software and are activated after a user executes them. Unlike a virus or a worm, a trojan does not replicate a copy of itself. Instead, it lurks silently in the background, compromising users' sensitive personal data.

Ransomware: This refers to a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking or threatening to erase the users' files unless a ransom is paid. You may recall the WannaCry attack that affected users across the globe this summer, only to be thwarted by the accidental discovery of a "kill switch" that saved people from the malicious software.

Spyware: This malware collects your personal information (such as credit card numbers) and often passes this information along to third parties online without you knowing.

You can check out more descriptions and examples of the types of malware that exist today at MalwareFox, a malware detection and removal software program.

Tips for Protecting Yourself Against Malware

Staying malware-free doesn't require an engineering degree. You can greatly reduce, if not completely eliminate, your chances of falling victim to malware by following these easy tips.

  • Keep your operating system current.
  • Keep your software up to date, particularly the software you use to browse the Internet.
  • Install antivirus and security software and schedule weekly scans. At TechSoup, we're protected by Symantec Endpoint Protection. At home, there are dozens of solutions you can use to protect yourself (PCMag lists many here).
  • Mind where you click. Think twice before you download torrent videos or free Microsoft Office templates from some random website.
  • Avoid public, nonpassword, nonencrypted Wi-Fi connections when you can. Use a VPN when you cannot.

Spread the Word

Let people know that TechSoup is helping you become more #CyberAware by sharing a message on your social media channels. If you tag @TechSoup on Twitter, we'll retweet the first two tweets. Remember, we're all in this together.

Password Security

Now that we've covered the nasty stuff that can make your life miserable if it ends up on your computer, let's go over some password security tips to help prevent malware from getting there in the first place. Using best practices when it comes to protecting your passwords is a proven way to protect your personal and financial information. Curious how knowledgeable you already are? Watch this video and take this quiz to enter a drawing for a $25 Amazon gift card!

First, let's go over some facts.

  • Passwords are the first line of defense to protect your personal and financial information.
  • A weak password can allow viruses to gain access to your computer and spread through TechSoup's or your family's network.
  • It's estimated that 73 percent of users have the same password for multiple sites and 33 percent use the same password every time. (Source: Digicert, May 2014)
  • Despite a small sample size of 1,110 U.S. adults, a recent YouGov survey still found that 28 percent of adults use the same passwords for most of their online accounts. (Source: Business Insider, October 2017).

Best Practices for Effective Password Protection

One great way to better protect yourself is by opting for a passphrase, which is much more difficult to crack than a single-word password. Here are some guidelines to creating one.

  • Pick a famous quote or saying and use the first letter of each word.
  • Add a number that you can remember.
  • Capitalize one letter.
  • Make it unique by adding the first letter of your company's name to the beginning or end of the passphrase.
  • Make it between 16 and 24 characters.

You should never write your password down, but if you must, never store user IDs and passwords together. Finally — even though it might seem unwieldy — you should always use a different password for each site that requires one. In today's world, everything is connected. A savvy hacker can easily breach your bank account, email, and medical records in one fell swoop if you're using the same password for all three.

Additional Cybersecurity Resources

In case you missed it, take a look at last week's post on recognizing suspicious emails.

Need a little inspiration? Find out how TechSoup and Symantec are making a difference in the lives of at-risk teens.

Get more security tips from the National Cyber Security Alliance. National Cyber Security Alliance Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved.




protect

FDI screening moves to the fore as protectionism takes hold

Authorities in the US, the EU and across the developed world are stepping up efforts to scrutinise foreign investment on the grounds of both national security and tech sovereignty.




protect

How Do We Really Protect the Grid from the Bad Guys?

From David and Goliath to Luke Skywalker and the Death Star, the human race has been reminded again and again that big things have their vulnerable points. The U.S. power grid, sometimes called the world’s largest machine, is no exception.




protect

Protecting Workers and Communities During the Clean Energy Transition

When I worked at the New York Attorney General's Office, we sued coal-fired power plants because their air pollution was making people sick. But in some towns, I saw that the reliance on coal really had people in a bind. The coal plant was making them sick, but it was also a major tax generator for the town. If the plant closed, the town might have to lay off teachers and cops, in addition to losing the plant jobs.




protect

PG&E Seeks Court Protection From Federal Regulators on Renewable Energy PPASs

PG&E Corp. is seeking court protection to amend or cancel power purchase agreements with suppliers as part of its bankruptcy proceedings.




protect

Protect your privacy with this half-price VPN

TL;DR: A one-year subscription to Norton Secure VPN is on sale for £2.50 per month, saving you 50% on list price.


It feels like the world of VPNs is expanding, with more and more providers entering the market and increased demand from users. 

This market can be a daunting place, especially as you probably won't be familiar with most of the available providers. This doesn't mean you shouldn't consider these services, but we totally understand if you're reluctant to invest in an unknown provider.

Fortunately for those who would prefer to subscribe to an established provider, there are plenty of options from the leading names in securityNorton is one such brand, with a comprehensive VPN service on sale for just £2.50 per month. Read more...

More about Norton, Mashable Shopping, Shopping Uk, Uk Deals, and Norton Security




protect

Annual Report to Congress on Breaches of Unsecured Protected Health Information

The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report.




protect

Annual Report to Congress on Breaches of Unsecured Protected Health Information

The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report.




protect

Annual Report to Congress on Breaches of Unsecured Protected Health Information

The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report.




protect

HR e-briefing 527: BIS announcements on collective consultation and protected conversations

Today, Vince Cable has announced a number of measures with the stated aim of making “it easier for businesses when taking on, managing and letting go their staff, while also being fair to workers”. As well as announcing further details ...




protect

Coronavirus – Income protection – Europe

The COVID-19 global pandemic has moved faster than anyone could have anticipated and governments across the world have rushed to shore up protection on two key fronts: the health of the public and the economy. In the UK, measures were introduced by ...




protect

Protecting Intellectual Property during Lockdown

On 24 March 2020, the Companies and Intellectual Property Commission’s IP Registry suspended all internal and external-facing operations due to the national lockdown. The Registry will only resume operations two weeks after the national lockdo...




protect

Protecting your IP when contracting with third parties – IP development and exploitation agreements – webinar

In this webinar for education institutions we will consider: - contract principles - early questions to consider: • what is the purpose of collaboration? • what IP may be generated? • who owns background IP? ...




protect

IHC HR e-briefing 131 - Data protection: ICO flexes muscles with first use of new fines power

The ICO has announced its first use of its recent power to issue fines or monetary penalties for serious breaches of the data protection legislation. The power became effective in April 2010 (see Full Article



protect

Coronavirus - Compliance risks for companies under the Infection Protection Law - Germany

I. Introduction The Covid-19 pandemic poses new challenges to society as a whole and to each individual. The rapid spread of the virus is currently prompting political decision-makers to react just as quickly by developing and adopting new measures...




protect

Protecting companies from Coronavirus crime and fraud

Protecting companies from Coronavirus crime and fraud Whilst our communities, including the business community, are pulling together like never before to protect the country and the National Health Service from the Coronavirus outbreak, fraudsters a...




protect

Coronavirus (Scotland) Act (“the Bill”): Protection from Irritancy

In light of the Covid-19 outbreak both the UK and the Scottish Government have introduced measures to give both private and business tenants temporary protection from eviction and irritancy. Of particular interest for businesses is the extension of ...




protect

Coronavirus (Scotland) Act (“the Bill”): Protection from Irritancy

In light of the Covid-19 outbreak both the UK and the Scottish Government have introduced measures to give both private and business tenants temporary protection from eviction and irritancy. Of particular interest for businesses is the extension of ...




protect

Coronavirus - How to use fraud prevention controls to protect your business from scams – Global

Since the outbreak of  the coronavirus pandemic just a few months ago, unfortunately we have seen a continuous rise in coronavirus related frauds targeting individuals, businesses and health authorities. Recent estimates suggest that already ov...




protect

Coronavirus - Additional legal protections for residential and commercial tenants in England and Wales - UK

In addition to the FCA’s recent guidance (see our note summarising the main points here) on payment holidays and repossession actions addressed to mortgage lenders, mortgage administrators, home purchase providers and home purc...




protect

Legal professional privilege update: protections and pitfalls

...




protect

Coronavirus - Import duty and VAT on medical supplies, equipment and protective clothing - Europe

In order to help in the fight against COVID-19, the European Commission has adopted a Decision, addressed to the Member States, which allows for tax authorities across Europe to offer import tax reliefs to importers of personal protective equipment ...




protect

Ansell: Global Leader In Protective Gloves And Germ Prevention




protect

Protection of employees (Temporary Agency Work) Bill 2011

Introduction The Protection of Employees (Temporary Agency Work) Bill 2011 (“the Bill”) was published on Friday 16 December 2011. The Bill is intended to give effect to an EU Directive (Directive 2008/104/EC) on...




protect

Not Tested, Not Protected, Badly Paid: Ukraine's Medics Speak Out

The Ukrainian government promised that all medical personnel would be tested for COVID-19 once every five days, but doctors have told RFE/RL that has not happened. Medics also said that there were shortages of protective gear and that government promises of increased pay have not been met.




protect

Alg�rie: R�vision de la Constitution - Des garanties pour une protection plus efficace des deniers publics

Alger -Le projet de r�vision de la Constitution dont les...




protect

Cyber liability: how can businesses protect themselves against underestimated cyber risks?

Cyber risk is the risk of financial loss, disruption, or damage to reputation as a result of  breaches of data security, including unauthorised disclosure of data, and compromise or failures of IT systems.  Specific examples include: ...




protect

Recommendation on the protection of health-related data

Recommendation CM/Rec(2019)2 of the Committee of Ministers to member States on the protection of health-related data Mobile health apps and other technical applications in the health sector are becoming more and more popular. Whether it's heart rate...




protect

Changes on the horizon in 2020: China and Hong Kong’s proposed reforms to data protection, cyber security and Internet content regulation

2020 looks set to be a significant year for privacy, cyber security and Internet content reforms in China and Hong Kong. On 20 December 2019, the Cyberspace Administration of China released the “Regulation on Governance of Internet Information...




protect

Changes to Charity Law – The Charities (Protection and Social Investment) Bill 2015

Introduction The Charities (Protection and Social Investment) Bill 2015 (“the Bill”) is currently before Parliament. The Bill is relatively short and deals with two areas in particular: i) the powers of charities to make social investmen...




protect

The proposal for an EC Directive on the protection of trade secrets – A state of play

The protection of trade secrets has been on the European legislator’s agenda since 2011. It was felt that the lack of harmonisation in this field is very disadvantageous for cross-border innovation in Europe. After the initial report requested...




protect

Closing the GAP: Guaranteed Asset Protection insurance - competition remedy

New rules in the FCA’s policy statement on Guaranteed Asset Protection (GAP) insurance (PS15/13) are about to change the way GAP insurance sold alongside the sale of a motor vehicle (add-on GAP Insurance) is sold to both consumers and commerci...




protect

The new Swedish Protective Security Act

...




protect

Six reasons to care about Brazil’s new data protection law

...




protect

Irish Data Protection Commissioner (DPC) issues guidance on CCTV for controllers

The DPC has published useful guidance on CCTV usage for controllers. The guidance is intended to assist owners and occupiers of premises to understand their responsibilities and obligations regarding data protection when using CCTV. This is particul...




protect

German data protection authorities agree on calculation model for GDPR fines

While fines recently imposed by the French and UK data protection supervisory authorities have been high, the supervisory authorities in Germany have so far imposed rather moderate penalties. This could now be changed by a new model for calculating ...




protect

Floodgates open on class actions in data protection

Court of appeal overturns High Court judgment in Lloyd v Google LLC [2019] EWCA Civ 1599 Court of Appeal judgment The Court of Appeal has given the go-ahead for a representative claim to be served on Google LLC in the U.S. for alleged data breaches,...




protect

Speed read: Useful November 2019 guidelines on controller, processor and joint controllership concepts from the European Data Protection Supervisor

Summary On 7 November 2019 the EDPS issued guidance on how to determine who is a controller, processor and joint controller. The EDPS is an independent supervisory authority whose primary objective is to ensure EU institutions and bodies respect the...




protect

Commencement of the Protection of Personal Information Act – 1 April 2020

President Cyril Ramaphosa has received a request from the Information Regulator Chairperson to declare that the remaining provisions of the Protection of Personal Information Act (POPIA) commence on 1 April 2020. If the President acts on the Informa...




protect

Coronavirus – Data Protection considerations for alternative communication platforms – Global

How does the communication within a team take place in the home office? Due to the increasing intensity of preventive measures against the spread of corona, more and more companies are closing down their locations and, where possible, relocating bus...




protect

Coronavirus - Protecting your company and brand - Global

...




protect

Coronavirus - Impact on International Trade & overview of unilateral protectionist measures

Introduction Following the declaration by the World Health Organisation (WHO) on 30 January of a Public Health Emergency of International Concern (PHEIC) in response to the coronavirus crisis (please see our last briefing here), the vi...




protect

Coronavirus - Impact on International Trade & overview of unilateral protectionist measures

Introduction Following the declaration by the World Health Organisation (WHO) on 30 January of a Public Health Emergency of International Concern (PHEIC) in response to the coronavirus crisis (please see our last briefing here), the vi...




protect

Protecting your interests - A guide to taking security in 21 countries worldwide

Companies trade in an increasingly global market. Despite this, the process of taking security in support of financial obligations remains essentially a question of the national law in the country where the assets over which security is granted are ...




protect

Global Corrosion Protection Polymer Coating Market 2020 Key Players Analysis, Segmentation, Growth, Future Trend, Gross ...

(MENAFN - CDN Newswire) A report added to the rich database of MarketsandResearch.biz , titled [To enable links in your articles, contact MENAFN Cl... ......




protect

RNC Launches 'Protect the Vote' to Fight Left's Vote-by-Mail Scheme

The Republican National Committee...




protect

US Toughens Visa Rules for Chinese Journalists to Add to ‘Greater National Security Protections’

In late February, China expelled three Wall Street Journal correspondents after the newspaper’s publication of an opinion column that Beijing condemned as racist. ......




protect

Hungary: 'Yes to Protecting Women, No to Gender Ideology, Illegal Migration'

Hungary's parliament has passed a...