At Book Expo America and the New York Rights Fair 2018 attendees can meet book publishing software vendors. Book Expo and New York Rights Fair admission tickets provide admission to the exhibit areas of both conventions. [Read more…]
After an extensive review process, longtime Cat’s Pajamas client Books International recently agreed to upgrade their Cat’s software to Media Services Group’s Élan Platform.
Since 1984, Books International, a family owned and operated company has provided fulfillment services and in recent years expanding services to include print-on-demand and digital services to publishers worldwide from the company’s headquarters in Dulles, Virginia.
Concordia Publishing House has signed a contract to implement the publishing software knkPublishing.
knkPublishing Editorial Office and Production (including the knk Media Library and Metadata Management), Rights and Royalties, Book Order Management, and Subscription Management will replace existing publishing and CRM systems at Concordia. The publishing house will leverage knkPublishing’s integration with Microsoft Dynamics NAV to meet Supply Chain, Finance and Accounting functional requirements. [Read more…]
This post presents an overview of a typical publisher’s “Cost of Goods Sold” accounts in QuickBooks. [Read more…]
QuickBooks can be configured to track expenses associated with a production of a title.
The customized QuickBooks Premier report below shows expenses assigned to the title “Blue Sky”. The name field shows the expense class; Prepress or PPB, and expense types such as cover design, copy editing, proofing, printing or freight. The source name field shows the vendor. The memo field displays a note associated with the vendor’s bill. [Read more…]
The Book Expo America (31 May to 2 June 2017) in New York offers an excellent opportunity to meet with publishing software vendors and learn about new applications the book publishing software. [Read more…]
The 2017 London Book Fair (14-16 March 2017) offers an excellent opportunity to meet with publishing software vendors. [Read more…]
Ransomware is of increasing concern to medium and large publishers.
Ransomware is a type of malware that restricts access to the infected computer system in some way; usually by encrypting your files, and demands that the user pay a ransom to remove the restriction. If you don’t have a backup you have to pay the hackers to gain access to your data.
Sony Pictures is one media company that was affected by a ransomware attack.
Often a system is infected by a phishing attack where a user inadvertently downloads malware or inadvertently provides a hacker with their user ID and password.
Information on Ransomware
Advice For Large Publishers
At Kensai we recommend that large publishers consult with internet security specialists from E&Y or PWC. Very large publishers should consider Accenture.
- Ernst & Young Cyber Security: http://www.ey.com/gl/en/services/advisory/ey-cybersecurity
- Price Waterhouse & Coopers: http://www.pwc.com/us/en/forensic-services/video/cyber-security.html
Protecting a book publishing software system against such intrusions requires multiple levels of protection.
Staff should receive instruction in best practices for internet security. Over 95% of security breaches are caused by an employee inadvertently providing their user name and password to a hacker.
Backup your data
Restoring a backup file can often negate the extent of a ransomware attack.
Internet Security Software
It starts with ensuring that every workstation that accesses your system has internet security software running. Internet security products can deny access to clients (local or remote) not running internet security software. For small and medium sized publishers with security concerns we recommend using Symantec Endpoint Protection Cloud. Enhance this by also using Malware Bytes Endpoint Security. Malware Bytes; like Sophos Intercept X, is designed to detect and stop ransomware attacks.
Medium and larger sized publishers should consider products such as Sophos Intercept X. Intercept X includes technology that detects spontaneous malicious data encryption to stop ransomware in its tracks. Even if trusted files or processes are abused or hijacked, this technology will stop and revert them without any interaction from users or IT support personnel. It works silently at the file system level, keeping track of remote computers and local processes that attempt to modify your documents and other files.
We recommend cloud managed hardware firewalls. Hardware firewalls are harder for hackers to breach. A cloud managed firewall includes hardware that needs to be connected to the network. The firewall is managed through the cloud by a service provider. Managed firewall services provide 24×7 firewall administration, monitoring, and quick responses to any malicious attacks.
Your company should enforce secure password specifications. This includes minimum character length, the exclusion of dictionary words, and a requirement that passwords be changed periodically.
Two Factor Authentication
We recommend two factor authentications for all email access logins and system logins. In addition to a user name, and password a third identifier such as a passcode sent to the user’s phone or a smart card is required for system access. Two factor authentications for system administrator logins should be required because these users have access to all systems.
Segment Your IT Systems
We recommend that large publishers segment their IT systems so that hacking one system does provide access to all segments of their IT infrastructure. Ransomware attacks are often successful because obtaining a single IT administrators password provides access to the entire system. Best practices call for software (i.e. folder access rights) and hardware (server access) based system segmentation.
An example of system segmentation is storing royalty contract documents on a separate physical server. The hard drive is encrypted. Access is limited to those with a need to know. Out of 400+ users, only 30 users; including the system administrator have access to this server and the royalty contract files stored there. The system administration has a separate username, password and utilizes 2nd factor authentication for accessing this server. Country-blocking is activated so the server cannot be directly accessed by users outside the home country. The server is backed up daily using two online backup services and monitored by Sophos Intercept X.
Employee laptops should have encrypted drives. This will prevent unauthorized users from accessing data stored on a lost or stolen laptop. We recommend services such as Absolute LoJack for Laptops that allow the IT administrator to remotely erase drives on misplaced laptops.
Locate servers in secure rooms with keyed access.
Publishing is changing. Faced with an increasing digitize world publishers are becoming providers of content to third parties that repackage their content. Consumers can obtain content in chunks, as subscriptions, temporary access and via the traditional book purchase.
A recent article by Wolf-Michael Mehl; Executive Vice President of Klopotek, touches on several current and future challenges in publishing and explains what Klopotek can do to support publishers in these specific fields.
The highlights of the article are:
There is a trend towards books being purchased in smaller numbers, while the types of products offered has to increase in order to remaining successful….Keywords such as “lending” content and flat rates for access to content are becoming more and more important.
The Klopotek author portal; STREAM Application – Authors Online, allows authors and agents to access royalties, sales, rights transactions and royalty statements online. This reduces the work for the staff and emailing statements instead of mailing them saves the company money.
The STREAM Application – Rights Sales Manager, allows publishers to focus on the marketing of available rights. All the information regarding a title and its component rights are accessible via a single portal. The rights manager also tracks potential licensee’s topics of interests.
Klopotek tracks “chunk” products for each title. A “chunk” is a component of a title. Examples of “chunks” are a chapter, a table, or a form.” “In Klopotek, “chunk” variants can have individual titles, prices, and information on page number, so they can be sold and invoiced just like e-books.”
The STREAM Application – Permissions and Compliance Manager, contains all of the content, asset and license metadata that allows the publisher to ensure that any content sales are in compliance with the licensing agreements.
Klopotek O2C; order to cash, application supports traditional sales models along with online subscriptions, bundles, bundles that include a subscription product along with the sale of customized products.
In addition to the points listed above I would add the importance of content discovery functionality. Content chunks only sell if a consumer or potential licensee discovers it. Context oriented discovery engines such as Google Scholar or Microsoft Academic can help a user find the content that he is looking for. These search engines index the full text and/or metadata of each indexed article/book.
The 2016 London Book Fair (14-16 April 2016) offers an excellent opportunity to meet with publishing software vendors. [Read more…]