ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Can We Learn From the Library of Congress’ Recent Hack Attack?

What Can We Learn From the Library of Congress’ Recent Hack Attack?

Believe it or not, there’s more news in Washington D.C. than matters concerning the upcoming election--namely the fact that the Library of Congress was struck by a DoS (Denial of Service) attack in July, supporting the members of government in their calls for an apparently much-needed update to the Library’s systems.

While the average American is most likely more aware of the Library’s function of cataloging the written works of the world, it actually serves many more purposes. Congress naturally relies on it, but mainly for its intelligence resources and tracking of legislation. However, with the Library’s systems in their current unreliable state, those who critically need to collect information for their duties are forced to use a faulty infrastructure that might not deserve a user’s full trust.

Despite the Library being one of the first government institutions to utilize the Internet in 1996, chronic mismanagement since 2002 has had a negative effect upon the Library’s systems. Contractors were mishandled, budgets miscalculated, management failed frequently, and IT services became a mess.

Much of the blame has also been placed on one of the former librarians responsible for managing the library. During their 28 year tenure, there was an apparent resistance to the implementation of any new technologies--including the reigning librarian’s reported refusal to use email.

More recently, the Library has struggled to keep a CIO, only hiring a permanent employee after the Government Accountability Office (GAO) tore apart the Library’s IT in its 2015 report. Additionally, while the GAO estimates the Library to spend $120 million in its IT, their records of these transactions leave much to be desired. The Library also has failed to keep an accurate inventory of its assets, reporting less than 6,500 computers available when the true total is somewhere nearer to 18,000--almost three times the amount stated in the Library’s report.

The issues of the Library have even spread to separate government offices that just happen to be under its shadow. The copyright office, for example, is so pervasively paper-based that many records are still card-catalogued, and must still share the Library’s antiquated system.

IT providers can learn many lessons from the plight of the Library, first and foremost being that resistance to change--only because it’s change--is no way to manage any organization; be it a national institution or a small business. As evidenced by the Library’s struggles, dedication to the old way of doing things has a time and place, neither of which may be found in a forward-thinking establishment.

Furthermore, automation could have potentially prevented many of the Library’s woes, especially if implemented as part of a managed services strategy. By automating recordkeeping and keeping a regular schedule of IT improvements, the Library could have greatly reduced the issues they are facing today.

Today, the Library’s fate is looking considerably more positive, as Congress is pushing a bill to set term limits on a Librarian of Congress’s time to a decade, and the new Librarian--Carla Hayden--has a rich and successful history of library reform and technological implementation in some very difficult regions. With the former President of the American Library Association at the helm, the Library’s future is looking considerably brighter.

If your tech needs a Carla Hayden of its own, reach out to us at ClearView IT. We have the solutions you need to fix your pain points and bring your technology forward, just like the Library of Congress is. Call us today at 866-326-7214 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 06 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Ransomware Data Backup communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Managed IT Services Data Recovery Communication Productivity Quick Tips Social Media VoIP Users Mobile Device Tech Term Automation Facebook Business Continuity Windows 10 Disaster Recovery Passwords Holiday Covid-19 Windows 10 Managed Service IT Support Browser Apps Cloud Computing Outsourced IT Miscellaneous Data Management Internet of Things Managed Service Provider Remote Work Saving Money Government Operating System Windows Workplace Strategy Artificial Intelligence Managed IT services Gadgets Networking App Virtualization Spam Business Technology Blockchain WiFi Bandwidth Mobile Device Management Remote Server Encryption Information Gmail Information Technology Office History Two-factor Authentication Office 365 Budget Employee/Employer Relationship Apple Big Data BDR Health Analytics Wi-Fi Cybercrime Conferencing Access Control Data Security Help Desk Vendor Hacking Voice over Internet Protocol Employer-Employee Relationship Remote Monitoring Document Management Save Money IT Management Remote Computing Hacker Training Compliance Patch Management Cost Management Search... Applications Best Practice Project Management Legal Mobile Office Retail Vulnerabilities Alert Data storage Managed Services Hiring/Firing Outlook Money Password Customer Service Unified Threat Management Data loss Firewall BYOD Computing Augmented Reality Word Vendor Management Hard Drive IBM Website Antivirus Law Enforcement Maintenance Storage The Internet of Things End of Support Printer YouTube Remote Workers Windows 7 Monitoring Windows 11 Free Resource Websites Laptop Healthcare Meetings Mobility How To Travel User Virtual Reality Social Engineering Google Maps Cryptocurrency Black Market Scam Social Sports Cleaning DDoS Chrome SaaS Robot VPN iPhone Update Cortana Education Mobile Computing Content Filtering Marketing Twitter Paperless Office Data Breach Router Running Cable Co-Managed IT Professional Services Entertainment How To Processor Microchip Physical Security Flexibility Managed Services Provider Hack Start Menu Identity Theft Notifications Computer Care Wireless Technology Virtual Private Network Multi-factor Authentication Downloads eWaste Unified Communications Vulnerability HIPAA Google Docs Current Events Software as a Service Saving Time Downtime Bluetooth Safety Solutions Distributed Denial of Service Data Protection Office Tips Bitcoin Private Cloud Memory Computers Images 101 Integration Virtual Desktop Telephone Experience Display Politics Excel Machine Learning Settings Employees Avoiding Downtime Tech Terms PowerPoint Disaster Holidays Managed IT Administration Solid State Drive Digital Presentation Virtual Assistant Lithium-ion battery Cooperation Specifications Chromebook Taxes Drones Video Conferencing IT Consultant Virtual Machines Automobile Customer Relationship Management Processors Computer Repair Relocation File Sharing Health IT Securty Displays PCI DSS Equifax Advertising Licensing Tactics Domains Tech Support Humor Hard Drive Disposal Redundancy Computer Accessories Work/Life Balance Gig Economy Business Communications Username Internet Service Provider Azure Cache Freedom of Information Unified Threat Management Workers Regulations Compliance Startup Managed IT Service Addiction Memes email scam In Internet of Things Navigation Hacks CCTV Human Resources Network Congestion Net Neutrality Smart Technology Mobile Security Printing News Touchscreen Reliable Computing User Tip Writing Financial Data Legislation Public Speaking Risk Management Network Management IT Emergency Evernote Streaming Media Computer Malfunction Vendor Mangement Google Apps Keyboard Fake News Troubleshooting Scalability Samsung Proxy Server Telework Emails Hard Drives Webcam Smartwatch Service Level Agreement Proactive IT Communitications Computing Infrastructure intranet Microsoft 365 Administrator Uninterrupted Power Supply Text Messaging Business Mangement Bring Your Own Device Management Wireless Procurement Supply Chain Device security Shortcut Microsoft Excel Environment Tablets FinTech Wireless Headphones Heating/Cooling CES Going Green Music IT Assessment Business Cards Social Networking Tech Windows XP Supercomputer Error Supply Chain Management Workplace Value Google Calendar Cyber security Virus Business Owner Bookmark Organization Motion Sickness Download Smart Devices Piracy Botnet Term Google Drive Rental Service Micrsooft Remote Working Scams HTML Comparison Trend Micro Browsers Flash AI Nanotechnology Digital Security Cameras Upload Business Growth Electronic Health Records Software License Transportation Knowledge Corporate Profile Google Play Telephone Systems Telephony Employer Employee Relationship Social Network Staffing Cables Wasting Time Television eCommerce Modem Inbound Marketing Cabling Data Analysis Screen Reader IP Address Banking G Suite Videos Trends Google Wallet Surveillance Mobile Technology Tablet Security Cameras VoIP Messenger Tracking Customer Resource management Deep Learning Point of Sale Devices Managing Costs Mouse Tip of the week SSID Fileless Malware Business Metrics Web Server Media Gamification Hosted Solution Development Shortcuts Company Culture Employer/Employee Relationships Electronic Payment Books Digital Payment Telephone System Recovery Regulations Competition Virtual Machine SharePoint Society Optimization Worker Directions Language Reviews Backup and Disaster Recovery Phone System 2FA Content Be Proactive Desktop Entrepreneur Teamwork Access LiFi Time Management Reading Public Cloud Electronic Medical Records Documents Monitors Data Storage Accountants Application Visible Light Communication Hypervisor Windows 8 Business Intelligence Medical IT Shopping Database Paperless Workplace Strategies SQL Server Audit Spyware

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?