(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Can We Learn From the Library of Congress’ Recent Hack Attack?

What Can We Learn From the Library of Congress’ Recent Hack Attack?

Believe it or not, there’s more news in Washington D.C. than matters concerning the upcoming election--namely the fact that the Library of Congress was struck by a DoS (Denial of Service) attack in July, supporting the members of government in their calls for an apparently much-needed update to the Library’s systems.

While the average American is most likely more aware of the Library’s function of cataloging the written works of the world, it actually serves many more purposes. Congress naturally relies on it, but mainly for its intelligence resources and tracking of legislation. However, with the Library’s systems in their current unreliable state, those who critically need to collect information for their duties are forced to use a faulty infrastructure that might not deserve a user’s full trust.

Despite the Library being one of the first government institutions to utilize the Internet in 1996, chronic mismanagement since 2002 has had a negative effect upon the Library’s systems. Contractors were mishandled, budgets miscalculated, management failed frequently, and IT services became a mess.

Much of the blame has also been placed on one of the former librarians responsible for managing the library. During their 28 year tenure, there was an apparent resistance to the implementation of any new technologies--including the reigning librarian’s reported refusal to use email.

More recently, the Library has struggled to keep a CIO, only hiring a permanent employee after the Government Accountability Office (GAO) tore apart the Library’s IT in its 2015 report. Additionally, while the GAO estimates the Library to spend $120 million in its IT, their records of these transactions leave much to be desired. The Library also has failed to keep an accurate inventory of its assets, reporting less than 6,500 computers available when the true total is somewhere nearer to 18,000--almost three times the amount stated in the Library’s report.

The issues of the Library have even spread to separate government offices that just happen to be under its shadow. The copyright office, for example, is so pervasively paper-based that many records are still card-catalogued, and must still share the Library’s antiquated system.

IT providers can learn many lessons from the plight of the Library, first and foremost being that resistance to change--only because it’s change--is no way to manage any organization; be it a national institution or a small business. As evidenced by the Library’s struggles, dedication to the old way of doing things has a time and place, neither of which may be found in a forward-thinking establishment.

Furthermore, automation could have potentially prevented many of the Library’s woes, especially if implemented as part of a managed services strategy. By automating recordkeeping and keeping a regular schedule of IT improvements, the Library could have greatly reduced the issues they are facing today.

Today, the Library’s fate is looking considerably more positive, as Congress is pushing a bill to set term limits on a Librarian of Congress’s time to a decade, and the new Librarian--Carla Hayden--has a rich and successful history of library reform and technological implementation in some very difficult regions. With the former President of the American Library Association at the helm, the Library’s future is looking considerably brighter.

If your tech needs a Carla Hayden of its own, reach out to us at Carceron. We have the solutions you need to fix your pain points and bring your technology forward, just like the Library of Congress is. Call us today at (770) 424-3393 for more information.


No comments yet
Already Registered? Login Here
Wednesday, 26 October 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Tip of the Week Internet Microsoft Business Management Managed Service Provider Software Cloud Workplace Tips Backup Saving Money Data Small Business Hardware Productivity Hackers Gadgets Mobile Office Business Computing Business Email Malware Hosted Solutions Google Quick Tips IT Services Social Media IT Support Virtualization Upgrade Mobile Devices Business Continuity Passwords Users Smartphones Disaster Recovery Microsoft Office Network Windows VoIP WiFi Server Miscellaneous Innovation Computer User Tips Mobile Device Management Windows 10 Communication Efficiency Smartphone Mobile Computing Vendor Management Operating System Remote Computing BYOD Unified Threat Management Marketing Apps The Internet of Things Holiday History Analytics Bring Your Own Device Health IT Consultant Ransomware Facebook Android Going Green Windows 8 Wireless Technology Apple Alert Saving Time Network Security Outlook Hard Drives Lithium-ion Battery Office Big data Printer Content Filtering Tech Support Information Technology Firewall Hiring/Firing Collaboration Data Management Save Money Phishing Remote Monitoring Employer-Employee Relationship Gmail Spam Proactive IT Save Time Bandwidth Computers Search Automation Best Practice Humor Antivirus Smart Phones Maintenance Browser Tutorials Computer Repair App Current Events Document Management Education Mobile Device Hacker Phone System Budget Internet of Things User Error Black Market Fax Server Two-factor Authentication Money Wireless Website Running Cable Avoiding Downtime PowerPoint Help Desk Router Hacking Sports User Administration Intranet Virus Business Intelligence Managed IT services Excel iPhone Cortana Hosted Solution Thin Client Statistics Presentation Risk Management SaaS Processors Streaming Media communications Net Neutrality Documents Telephone Systems BDR Retail Compliance Business Growth Inbound Marketing Social Networking Digital Payment Customer Relationship Management Encryption Bluetooth Virtual Desktop Computer Accessories Laptop Comparison Comanaged IT Networking Network Congestion Experience Managed IT Augmented Reality Heating/Cooling End of Support Text Messaging Artificial Intelligence Pain Points Twitter VPN Printer Server Law Enforcement Office 365 Outsourced IT Gaming Console Legal Data storage Safety Company Culture Social Cost Management Chrome Downtime Customer Service Flexibility Government USB Recovery Office Tips Programming Cybercrime Computing Password IBM Virtual Reality Word Video Surveillance Society 3D Online currency Notifications Public Speaking Trending Micrsooft HIPAA Skype Windows XP Point of Sale IT service Electronic Payment Turn Key Computing Infrastructure Entrepreneur Debate Teamwork Robot CIO Memory Wi-Fi Lifestyle Music Best Available IP Address Upgrades Storage Leadership Read Human Resources Harddrive Flash Adminstration Keyboard Value Deep Learning LiFi File Sharing Settings PDF Banking Shortcut Adroid Touchscreen Monitors Troubleshooting Visible Light Communication Language Business Metrics Google Wallet LinkedIn Domains Displays Business Owner Advertising Wearable Technology eWaste Chromebook Mouse Drones Co-Managed IT Operating Systerm External Harddrive Specifications YouTube Work/Life Balance Environment Competition Writing Entertainment organize Analytic Ebay Unified Communications Riske Management Display Download Application Webinar Digital Signature Staffing Efeciency switches Pirating Information Permissions Content Management Paperless Office Microchip Recycling Google Docs Disaster DDoS Regulations Identity Theft Solid State Drive Archive GPS Update Hacks Securty Tablet IT consulting Microserver

Mobile? Grab this Article!


Recent Comments

Ryder Frith Milla Minchin Use Your Smartphone Incorrectly and Risk Going Temporarily Blind
24 October 2016
Wonderful post and you share excellent content in this post i am happy to comment on this Online Fa...

Blog Archive