Menu
Log in


INTERNATIONAL FOUNDATION FOR
CULTURAL PROPERTY PROTECTION

Log in

News


<< First  < Prev   1   2   3   4   5   ...   Next >  Last >> 
  • March 11, 2025 2:42 PM | Anonymous

    Reposted from ArtSentry

    Our Guide, The Essentials: 25 Questions to Ask Before You Upgrade Your Museum Security Solution helps your team navigate these conversations. The section on evaluating visitor behavior offers practical steps for balancing protection and engagement. 

    Did you know 90% of museum incidents involving damage or loss of artifacts are caused by visitor actions? These moments often stem from misunderstanding, not malice, but their consequences can be devastating—and they highlight the importance of a well-thought-out security strategy.

    Choosing the right museum security solution isn’t just about picking a product. It’s about ensuring your team aligns priorities like protecting artifacts, engaging visitors, and meeting compliance standards before you start shopping.

    Does this align with your museum’s current challenges? I’d love to hear how your team is approaching security planning.

    See Original Post


  • March 11, 2025 2:31 PM | Anonymous

    Reposted from Walden Security

    We understand that safety and security are among the top priorities for any business. We have a supplemental option designed to enhance security and deter potential threats to your business: Mobile Patrols.

    How can a Mobile Patrol Program help your business?

    PERIMETER CHECKS: Our Mobile Patrol Officers will conduct regular perimeter checks of your property, ensuring that all entrances and exits are secure, all lighting works properly and guarantees that gates or barriers function correctly.

    TRESPASSERS AND LOITERERS: Periodic checks to your property to ensure absence of any trespassers or loiterers. Additionally, they will identify, report, and remove any suspicious activities or people they encounter during patrols.

    VANDALISM:  We will perform patrols of your premises, looking for signs of vandalism or damage. Their presence alone can deter potential vandals from targeting your business, protecting your property from costly repairs.

    See Original Post


  • March 11, 2025 1:39 PM | Anonymous

    Reposted from CISA/DHS

    In case you missed the call, the DHS Bi-Weekly I&A Cyber Intelligence Center concentrated on the following topics: 

    • Enhanced Visibility and Hardening Guidance for Communications Infrastructure
      • Enhanced Visibility and Hardening Guidance for Communications Infrastructure | CISA
    • China State-Sponsored Cyber Threat: Advisories
      • China State-Sponsored Cyber Threat: Advisories | CISA
    • FBI Public Service Announcement - North Korea Responsible for $1.5 Billion Bybit Hack
      • Internet Crime Complaint Center (IC3) | North Korea Responsible for $1.5 Billion Bybit Hack 
    • Joint Cybersecurity Advisory - TraderTraitor: North Korean State-Sponsored, APT Targets Blockchain Companies
      • 220418.pdf

     How Phished Data Turns into Apple & Google Wallets

    • How Phished Data Turns into Apple & Google Wallets – Krebs on Security

    See Original Post


  • March 11, 2025 12:46 PM | Anonymous

    Reposted from Tim Richardson

    Have you ever had one of the following experiences?

    • Boarding a flight on a plane where your assigned seat is a middle seat and then finding your row entirely empty.
    • Pulling into a downtown parking space where you notice there’s a lot of time left on the meter.
    • Shuffling through that kitchen drawer and finding a forgotten gift card.
    • Putting your hands in the pocket of a pair of jeans you haven’t worn in a while and finding unexpected money in your pocket.

    We’ve all had positive, unexpected things happen to us before. My most recent “finding a wad of cash” made my day.

    Here’s what happened.

    A client who I worked with last year emailed me recently to inform me that I hadn’t cashed the check from a late year speaking engagement. Indeed, the undeposited check was in my desk drawer, placed there during a very busy season. She had no idea that her simple communication would make my day.

    This experience was a reminder about how our actions and words, particularly when unexpected, can make a huge impact on others. They can turn around a negative situation into a positive one or even change the trajectory of someone’s life.

    Last week, I had a conversation with a client who had attended a conference where I had presented more than 15 years ago. He told me that his organization had benefited greatly from the presentation and cited specific benefits from my training.

    He told me this story:

    One of my staff members was underperforming. In fact, due to his poor performance, he was about to be fired. As I was thinking about how to have that difficult conversation, I thought back to a point you made in your presentation. I thought about the skillsets he had which were not being utilized in his current position. That job wasn’t a good fit for him. Instead of firing him as he was expecting, I reassigned him to another position, one that complimented his natural talents. It didn’t take long for both of us to realize that he would excel in his new job. Eventually, he became one of the biggest superstars in our organization. It’s not uncommon for our customers to bring him coffee or doughnuts on occasion to thank him for the work he does. They love how passionately he performs his duties and the incredible energy he brings to work each day. By elevating him to a job that was a perfect fit, he has been able to create exceptional experiences for our customers.

    My message from that 2010 presentation was this:

    Everybody has value. Excellent leaders identify the best traits on his or her team and figure out how to use them to the greatest benefit of the individual AND the organization.

    If you are a leader and you aren’t doing that, you aren’t doing your job.

    Good leaders bring out the best in others. They look for unexpected opportunities to communicate encouragement, positive support, and lift up others. They regularly assess the needs of their organization and help their teams reach their full potential.

    They continuously look for ways to provide “a wad of cash in your pocket” experience for those around them and they repeat those moments frequently.

    See Original Post


  • March 11, 2025 12:17 PM | Anonymous

    Reposted from ATALM

    We are pleased to announce the Strengthening Institutional Support for Native Artists and Culture Bearers Summit taking place October 7-9, 2025, in Cherokee, North Carolina. Held concurrently with ATALM2025, this transformative three-day gathering is dedicated to strengthening institutional support for Native artists, expanding funding opportunities, showcasing model programs, and amplifying artists' voices.

    With support from the Ford Foundation, ATALM, is partnering with the Native Arts & Cultures Foundation and other partners to bring together Native artists, cultural leaders, funders, policymakers, and cultural institutions to develop actionable strategies that enhance sustainability, representation, and economic opportunities for Indigenous artists and culture bearers.

    We invite your involvement in one or more of these areas:

    • Request an invitation to attend. Space is limited, and participation is by invitation to ensure a diverse and engaged community of artists, funders, and institutions. Request an invitation here.
    • Request financial support.  After you receive an invitation to attend, you may request financial assistance to cover registration, lodging, or travel. Submit an application here.
    • Propose a Session.  ATALM is seeking presentations that amplify artists' voices and their needs, showcase model programs and best practices, cover funding and institutional support for Native artists, promote economic empowerment, cultural equity, and policy advocacy, and other topics that will help develop an action plan. Submit a session proposal here.
    • Join as a Summit Partner. Funders, arts agencies, tribes, and cultural institutions are invited to support the summit through funding, programmatic collaboration, and/or resource sharing. Apply to be a Summit Partner here.

    All applications are due by April 1, 2025, although we will continue to accept applications until we reach capacity.

    This is a critical moment to advance sustainable support for Native artists and cultural practitioners through increased institutional support. We encourage you to apply, participate, and help shape a stronger future for Indigenous arts.

    See Original Post


  • March 11, 2025 12:09 PM | Anonymous

    Reposted from EMR-ISAC

    The National Wildfire Coordinating Group (NWCG) has announced the availability of the 2025 version of the NWCG Incident Response Pocket Guide (IRPG), PMS 461.

    The NWCG IRPG is an operational job aid carried by all federal, state, local, tribal, and territorial wildland firefighters in the United States, establishing standards for wildland fire incident response. The guide provides critical information on operational engagement, risk management, fire environment, all-hazard response, and aviation management. It is a collection of guidelines, checklists, and best practices that have evolved over time within wildland fire operations.

    Major updates and changes in the 2025 IRPG include the addition of nighttime fuel estimates for reference fuel moisture, considerations for unmanned aircraft systems (UAS) operations, an updated section on fire weather forecast information regarding the potential for lightning, and more.

    See Original Post


  • March 11, 2025 12:02 PM | Anonymous

    Reposted from EMR-ISAC

    The Federal Bureau of Investigation (FBI) Internet Crime Complaint Center (IC3) has released an alert warning of a scam involving criminal actors masquerading as the “BianLian Group.” The cyber criminals target corporate executives by sending extortion letters threatening to release victims’ sensitive information unless payment is received.

    See Original Post

  • February 25, 2025 1:56 PM | Anonymous

    Reposted from AAM

    *New Book*- Leaning Into Value: Becoming a user-focused Museum

    Are you taking a user-experience approach to your museum? In this new book, a leading researcher on museums’ community value provides guidance to museum leaders who may be struggling to navigate today’s often tumultuous, ever-changing economic, political, and educational landscape. Don’t miss this invaluable new addition to your bookshelf—your museum’s audiences will thank you!

    AAM Members receive 20% off

    See Original Post


  • February 25, 2025 1:49 PM | Anonymous

    Reposted from AAM

    The Annual Survey of Museum-Goers, conducted in partnership between Wilkening Consulting and the American Alliance of Museums, provides your museum with a cost-effective way to gain insight into your visitors and compare your institution to others in your locale, of similar type, and the museum field writ large. By participating in the Annual Survey of Museum-Goers, you will be:

    • gaining insight into your visitors, including who they are, their behaviors, and their values,
    • benchmarking your data against that of peers, especially around the 2025 themes below,
    • tracking changes in your stakeholders over time (with multi-year participation), and much more.

    Once you know exactly what makes your museum meaningful to your community, you’ll be better equipped to attract more visitors, make the case for increased funding, and keep up with our rapidly evolving environment.

    See Original Post

  • February 25, 2025 1:24 PM | Anonymous

    Reposted from CISA/DHS

    Internet of Things (IoT) devices used within smart city/connected community networks often provide greater efficiency and cost-effectiveness for municipal infrastructure services. However, the increasing use of IoT and the collection of data make connected communities an attractive target for malicious actors as vulnerabilities within IoT devices and systems could provide malicious actors with unauthorized access into connected community ecosystems and permit lateral movement across interconnected critical infrastructure networks. Compromise of IoT devices and systems provides malicious actors with the ability to steal sensitive data and disrupt services or critical processes, resulting in significant impacts throughout connected community critical infrastructure systems. The Connected Communities Initiative IoT Device Risk and Mitigation Infographic highlights cyber-based risks to connected communities from common interconnected IoT devices and groups the devices by IoT architecture, including the perception, transport, and application layers.  Additionally, the infographic identifies mitigation recommendations to limit the risk posed by IoT devices used by a connected community. SLTT decision makers can utilize the infographic to visualize interconnected IoT risks introduced by and implement risk mitigation measures. 

    See Original Post



<< First  < Prev   1   2   3   4   5   ...   Next >  Last >> 
  
 

1305 Krameria, Unit H-129, Denver, CO  80220  Local: 303.322.9667
Copyright © 1999 International Foundation for Cultural Property Protection.  All Rights Reserved