{"id":1494,"date":"2025-10-07T23:32:08","date_gmt":"2025-10-07T23:32:08","guid":{"rendered":"https:\/\/dreamwarrior.com\/blog\/?p=1494"},"modified":"2025-10-07T23:32:08","modified_gmt":"2025-10-07T23:32:08","slug":"cybersecurity-and-arts-2025-update","status":"publish","type":"post","link":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/","title":{"rendered":"Cybersecurity and The Arts \u2013 2025 update"},"content":{"rendered":"<h2>Why Arts Organizations Can No Longer Ignore Cybersecurity<\/h2>\n<p><span data-preserver-spaces=\"true\">We originally wrote this up after the <\/span><a class=\"editor-rtfLink\" href=\"https:\/\/dreamwarrior.com\/blog\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Met Opera was attacked<\/span><\/a><span data-preserver-spaces=\"true\">. Although there have been some limited improvements in the approach of the C-Suite to security in the Art organization, I am still dumb founded at the lack of security in some organizations, especially in the age of AI, where, based on <\/span><span data-preserver-spaces=\"true\">AWS&#8217;<\/span><span data-preserver-spaces=\"true\"> information, the number of hack attempts has increased by 700%.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">&#8220;B<\/span><span data-preserver-spaces=\"true\">eginning on December 6, <\/span><span data-preserver-spaces=\"true\">2022, hackers started the process of breaching the Met <\/span><span data-preserver-spaces=\"true\">Opera&#8217;s<\/span><span data-preserver-spaces=\"true\"> information infrastructure.<\/span><span data-preserver-spaces=\"true\">&#8221; <\/span><span data-preserver-spaces=\"true\">By December<\/span><span data-preserver-spaces=\"true\"> 7, a cyber-attack<\/span><span data-preserver-spaces=\"true\"> &#8220;<\/span><span data-preserver-spaces=\"true\">against The Metropolitan Opera in New York was well underway. The attack affected the <\/span><span data-preserver-spaces=\"true\">opera&#8217;s<\/span><span data-preserver-spaces=\"true\"> network systems, including its internal network, website, ticketing server, box office, and phone center. The <\/span><span data-preserver-spaces=\"true\">Opera&#8217;s<\/span><span data-preserver-spaces=\"true\"> website was restored eight days later, on December 15. According to Peter Gelb, The <\/span><span data-preserver-spaces=\"true\">Met&#8217;s<\/span><span data-preserver-spaces=\"true\"> general manager, the opera earns roughly $200,000 in ticket sales per day throughout this season. Because the malware impeded the <\/span><span data-preserver-spaces=\"true\">opera&#8217;s<\/span><span data-preserver-spaces=\"true\"> ability to sell tickets, seats were temporarily sold for $50 on the Lincoln Center for the Performing Arts website,<\/span><span data-preserver-spaces=\"true\"> resulting in a significant revenue loss that extended beyond the downtime period.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">In August 2024, approximately 40 French museums were hit by a ransomware attack, most notably the <\/span><strong><span data-preserver-spaces=\"true\">Grand Palais<\/span><\/strong><span data-preserver-spaces=\"true\"> and other institutions within the R\u00e9union des Mus\u00e9es Nationaux (RMN) network.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">The attack was detected on Sunday, August 4, 2024, and occurred during the Paris 2024 Olympics. <\/span><span data-preserver-spaces=\"true\">The Grand Palais was actively hosting fencing and taekwondo competitions at the time, while the Ch\u00e2teau de Versailles (also in the RMN network) was hosting equestrian sports and modern pentathlon events.<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span data-preserver-spaces=\"true\">The attackers encrypted parts of the <\/span><span data-preserver-spaces=\"true\">museums&#8217;<\/span><span data-preserver-spaces=\"true\"> systems, requested a ransom in cryptocurrency, and threatened to leak data if payment <\/span><span data-preserver-spaces=\"true\">wasn&#8217;t<\/span><span data-preserver-spaces=\"true\"> made within 48 hours.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Authorities confirmed that no data extraction was detected, and the Olympic competitions proceeded as planned.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">The attack affected the RMN online shop (boutiquesdemusees.fr) but <\/span><span data-preserver-spaces=\"true\">didn&#8217;t<\/span><span data-preserver-spaces=\"true\"> interrupt Olympic events.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">The Growing Threat Landscape for Cultural Institutions<\/span><\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">The cyber-attack on the Met is far from an isolated incident. The threat landscape has only intensified since COVID:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">The British Museum<\/span><\/strong><span data-preserver-spaces=\"true\">(2025)<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">The French Museums<\/span><\/strong><span data-preserver-spaces=\"true\">(2024)<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Museum of Fine Arts, Boston <\/span><\/strong><span data-preserver-spaces=\"true\">(2024)<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Gallery Systems (software provider)<\/span><\/strong><span data-preserver-spaces=\"true\">(2023)<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Optimizely \u2013 previously known as EpiServer (software provider) (multiple hacks and vulnerabilities since 2022)<\/span><\/strong><\/li>\n<li><span data-preserver-spaces=\"true\">The 2022 Met Opera attack highlighted the vulnerability of even the most prestigious institutions<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">In 2020, hackers obtained access to personal information from hundreds of cultural institutions and NGOs<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">Ransomware attacks on cultural institutions have increased significantly in recent years, with a notable rise of over 40% since 2022.<\/span> <span data-preserver-spaces=\"true\">Additionally, AI-driven phishing attempts are becoming increasingly sophisticated, making it easier for hackers to execute social engineering scams. <\/span><\/p>\n<p><span data-preserver-spaces=\"true\">They\u2019re<\/span><span data-preserver-spaces=\"true\"> crafting compelling messages that can trick employees into handing over sensitive data without a second thought. We also need to be worried about supply chain attacks. <\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Cybercriminals are now targeting ticketing platforms and donation processing systems, which opens up new avenues for them to infiltrate organizations<\/span><span data-preserver-spaces=\"true\">. And <\/span><span data-preserver-spaces=\"true\">let\u2019s<\/span><span data-preserver-spaces=\"true\"> not forget about state-sponsored hackers \u2014 they keep coming at institutions based on their public stance on international and political issues. <\/span><span data-preserver-spaces=\"true\">It\u2019s<\/span><span data-preserver-spaces=\"true\"> essential to recognize that hackers <\/span><span data-preserver-spaces=\"true\">don\u2019t<\/span><span data-preserver-spaces=\"true\"> discriminate; they target everyone, whether <\/span><span data-preserver-spaces=\"true\">you\u2019re<\/span><span data-preserver-spaces=\"true\"> a Fortune 500 company, a small business, or a not-for-profit cultural institution like the RMN.<\/span><span data-preserver-spaces=\"true\"> These places handle transactions, store customer info, maintain donor databases, and are increasingly dependent on digital infrastructure to keep things running smoothly.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">While the attackers of the Met Opera were never publicly identified, <\/span><span data-preserver-spaces=\"true\">The New York Times underlined the <\/span><span data-preserver-spaces=\"true\">opera&#8217;s<\/span><span data-preserver-spaces=\"true\"> vocal support for Ukraine amid the ongoing Russia-Ukraine<\/span><span data-preserver-spaces=\"true\"> conflict\u2014a reminder that cultural institutions can become targets for geopolitically motivated cyberattacks.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Why Cultural Organizations Are Prime Targets<\/span><\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">The cyberattack on the Met should serve as a wake-up call to other cultural organizations. Anyone could be a target.<\/span><span data-preserver-spaces=\"true\"> &#8220;<\/span><span data-preserver-spaces=\"true\">I usually warn clients that everyone, regardless of size or sector, is a target. It should not take an occurrence like this to wake up other cultural institutions to the fact that they are in grave danger,<\/span><span data-preserver-spaces=\"true\">&#8221; <\/span><span data-preserver-spaces=\"true\">says Richard Sheinis, partner and head of data privacy and cybersecurity at full-service legal firm Hall Booth Smith.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Cultural<\/span><span data-preserver-spaces=\"true\"> organizations, performing arts centers, theaters, museums, galleries, and educational institutions, are desirable targets for several reasons:<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Limited Resources:<\/span><\/strong><span data-preserver-spaces=\"true\"> They may not always have the time, money, skill set, or up-to-the-minute understanding to build a robust cybersecurity strategy.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Legacy Systems:<\/span><\/strong><span data-preserver-spaces=\"true\"> Many cultural institutions operate on outdated technology that lacks modern security features and may no longer receive security updates.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Valuable Data:<\/span><\/strong><span data-preserver-spaces=\"true\"> Donor databases, patron information, payment processing systems, and intellectual property (recordings, digital archives) represent valuable targets.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Human Factor Vulnerabilities:<\/span><\/strong><span data-preserver-spaces=\"true\"> Unlike many for-profit organizations, which are often <\/span><span data-preserver-spaces=\"true\">victims of zero-day vulnerabilities, the bulk of security breaches in smaller enterprises and most non-profits are caused by preventable flaws in<\/span><span data-preserver-spaces=\"true\"> human-device <\/span><span data-preserver-spaces=\"true\">interaction. The untold story of cybersecurity is how criminals<\/span><span data-preserver-spaces=\"true\"> exploit the imperfect nature of humans to further their own goals, and this has only worsened with AI-generated phishing that can convincingly impersonate executives, board members, or vendors.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">High-Profile Impact:<\/span><\/strong><span data-preserver-spaces=\"true\"> Attacks on cultural institutions generate significant media attention, which appeals to hackers seeking notoriety or making political statements.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">The Post-Pandemic Reality<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Finding funding for cybersecurity has always been difficult at non-profits, <\/span><span data-preserver-spaces=\"true\">but it is a worthy investment. A good security posture today can save hundreds of<\/span><span data-preserver-spaces=\"true\"> thousands\u2014or even millions\u2014later. However, many people are hard-pressed to believe that it could happen to them.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">While many cultural institutions have recovered operationally from the COVID-19 pandemic, the digital transformation forced by the pandemic has actually expanded their attack surface. Virtu<\/span><span data-preserver-spaces=\"true\">al programming, streaming services, expanded e-commerce, remote work arrangements, and cloud-based operations have all created new vulnerabilities that <\/span><span data-preserver-spaces=\"true\">didn&#8217;t<\/span><span data-preserver-spaces=\"true\"> exist before 2020.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Additionally, new regulatory requirements have emerged:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span data-preserver-spaces=\"true\">Enhanced data privacy regulations (GDPR, CCPA, and state-level privacy laws)<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Mandatory breach notification requirements with shorter timeframes<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Incre<\/span><span data-preserver-spaces=\"true\">ased liability for data breaches, with potential fines reaching millions of dollars<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Cyber insurance requirements that mandate specific security controls<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><strong><span data-preserver-spaces=\"true\">Modern Cybersecurity: Essential Steps for Cultural Institutions<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Bringing cybersecurity to the forefront in <\/span><span data-preserver-spaces=\"true\">cultural institutions is the first critical step. Subsequent evaluation of the infrastructure and investment in prevention, detection, and response can help<\/span><span data-preserver-spaces=\"true\"> reduce the likelihood of cyberattacks while also mitigating the damage if one occurs.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Recommended Approach:<\/span><\/strong><\/h3>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li><strong><span data-preserver-spaces=\"true\">Initial Assessment:<\/span><\/strong><span data-preserver-spaces=\"true\"> Have your in-house IT team conduct a comprehensive security audit<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Exper<\/span><span data-preserver-spaces=\"true\">t Partnership:<\/span><\/strong><span data-preserver-spaces=\"true\"> If your organization lacks the means to retain in-house cybersecurity personnel, partner with third-party cybersecurity firms specializing in non-profit or cultural institutions<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Board-Level Engagement:<\/span><\/strong><span data-preserver-spaces=\"true\"> Ensure cybersecurity is a regular board agenda item, not just an IT concern<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Cyber<\/span><span data-preserver-spaces=\"true\"> Insurance:<\/span><\/strong><span data-preserver-spaces=\"true\"> Obtain appropriate cyber liability insurance (though be aware that insurers now require proof of security controls)<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h2><strong><span data-preserver-spaces=\"true\">Critical Security Controls for 2025<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Until you engage a cybersecurity firm, implement these essential protections:<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Multi-Layered Firewall Protection<\/span><\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">When<\/span><span data-preserver-spaces=\"true\"> it comes to safeguarding your <\/span><span data-preserver-spaces=\"true\">institution&#8217;s<\/span><span data-preserver-spaces=\"true\"> digital environment, <\/span><span data-preserver-spaces=\"true\">it&#8217;s<\/span><span data-preserver-spaces=\"true\"> essential to utilize multiple layers of firewall protection. Start with an edge firewall provided by your internet service provider, which acts as the first line of defense against external threats. Within your organization, an institutional firewall shields your internal network from unauthorized access. For <\/span><span data-preserver-spaces=\"true\">systems that handle sensitive tasks, such as ticketing, donation processing, or managing customer relationships, application-specific firewalls provide an additional layer of security tailored to those specific needs. To s<\/span><span data-preserver-spaces=\"true\">tay ahead of evolving threats, consider <\/span><span data-preserver-spaces=\"true\">next-generation firewalls that include advanced features such as intrusion<\/span><span data-preserver-spaces=\"true\"> detection and prevention, providing more robust protection for your critical systems.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Network Segmentation<\/span><\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">When organizing your network, ensure that you set up separate subdomains for internal and external connections to maintain a clear division between them. You<\/span><span data-preserver-spaces=\"true\">r payment processing systems should run on their own isolated network to maintain PCI-DSS compliance. The guest Wi-Fi needs to be wholly disconnected from the main operational networks your team uses daily. And whenever you can, go with a zero-trust model, which means verifying every single access request\u2014no matter where <\/span><span data-preserver-spaces=\"true\">it&#8217;s<\/span><span data-preserver-spaces=\"true\"> coming from.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Modern Encryption Standards<\/span><\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">Having SSL\/TLS certificates on all your websites <\/span><span data-preserver-spaces=\"true\">isn&#8217;t<\/span><span data-preserver-spaces=\"true\"> optional; <\/span><span data-preserver-spaces=\"true\">it&#8217;s<\/span><span data-preserver-spaces=\"true\"> required. For any sensitive communications, ensure that <\/span><span data-preserver-spaces=\"true\">there&#8217;s<\/span><span data-preserver-spaces=\"true\"> end-to-end encryption to keep information private from start to finish. When it comes to storing data, especially information such as donor and patron details, encrypt that data while <\/span><span data-preserver-spaces=\"true\">it&#8217;s<\/span><span data-preserver-spaces=\"true\"> stored on your servers. Als<\/span><span data-preserver-spaces=\"true\">o, remember to regularly check and renew your certificates to maintain security and ensure everything remains up to date.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Multi-Factor Authentication (MFA)<\/span><\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">All staff accounts, not just those belonging to administrators, need to have multi-factor authentication in place. Whenever someone tries to access institutional systems remotely, <\/span><span data-preserver-spaces=\"true\">it&#8217;s<\/span><span data-preserver-spaces=\"true\"> absolutely required. Yo<\/span><span data-preserver-spaces=\"true\">u should also enable MFA for donor portals and patron accounts whenever possible. Instead of relying on SMS codes, which can be intercepted, <\/span><span data-preserver-spaces=\"true\">it&#8217;s<\/span><span data-preserver-spaces=\"true\"> better to use authenticator apps or hardware tokens for added security.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">System Hardening and Diversity<\/span><\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">To strengthen your cybersecurity posture, your website and your ticketing server <\/span><span data-preserver-spaces=\"true\">mustn&#8217;t<\/span><span data-preserver-spaces=\"true\"> run on the same operating system. For instance, if your website uses Windows, consider running your ticketing server on Linux. This makes it significantly harder for hackers to compromise both systems simultaneously. If <\/span><span data-preserver-spaces=\"true\">there&#8217;s<\/span><span data-preserver-spaces=\"true\"> no way to avoid using the same operating system for multiple critical systems, ensure that you have real-time security monitoring in place, complete with 24\/7 alerts, so <\/span><span data-preserver-spaces=\"true\">you&#8217;re<\/span><span data-preserver-spaces=\"true\"> always informed of any suspicious activity. Another key step is to stay on top of regular patching schedules for all your systems and applications, ensuring vulnerabilities are addressed as soon as updates become available. Lastly, take some time to review your systems and remove or disable any unnecessary services and applications\u2014they can present risks if left unchecked.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">New Essential Protections (2025 Standards)<\/span><\/strong><\/h2>\n<p><strong><span data-preserver-spaces=\"true\">Email Security:<\/span><\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span data-preserver-spaces=\"true\">A<\/span><span data-preserver-spaces=\"true\">dvanced email filtering with AI-powered phishing detection<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">DMARC, SPF, and DKIM email authentication protocols<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Email sandboxing for suspicious attachments<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Regular phishing simulation training for all staff<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Endpoint Detection and Response (EDR):<\/span><\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span data-preserver-spaces=\"true\">Deploy EDR solutions on all devices (computers, tablets, phones)<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Real-time monitoring and automated threat response<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Regular endpoint security assessments<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">B<\/span><span data-preserver-spaces=\"true\">ackup and Recovery:<\/span><\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span data-preserver-spaces=\"true\">Implement the 3-2-1 backup rule: 3 copies of data, 2 different media types, 1 offsite<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Immutable backups that cannot be encrypted by ransomware<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Regular backup testing and documented recovery procedures<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Air-gapped backups for critical data<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Access Management:<\/span><\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span data-preserver-spaces=\"true\">Principle of least privilege (users only get access they absolutely need)<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">R<\/span><span data-preserver-spaces=\"true\">egular access reviews and removal of unnecessary permissions<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Immediate account deactivation procedures when staff leave<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Privileged Access Management (PAM) for administrative accounts<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Vendor Risk Management:<\/span><\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span data-preserver-spaces=\"true\">Security assessments of all third-party vendors (ticketing platforms, payment processors, cloud services)<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Contractual security requirements and right-to-audit clauses<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">R<\/span><span data-preserver-spaces=\"true\">egular vendor security reviews<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Incident response coordination with critical vendors<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Security Awareness Training:<\/span><\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span data-preserver-spaces=\"true\">Mandatory annual cybersecurity training for all staff, volunteers, and board members<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Regular updates on emerging threats (especially AI-powered scams)<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Clear incident reporting procedures<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Simulated phishing exercises to test and improve awareness<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Incident Response Plan:<\/span><\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span data-preserver-spaces=\"true\">D<\/span><span data-preserver-spaces=\"true\">ocumented procedures for various attack scenarios<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Transparent chain of command and communication protocols<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Pre-identified cybersecurity incident response team<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Relationships established with forensic firms and legal counsel before an incident occurs.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Regular tabletop exercises to test the plan<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><strong><span data-preserver-spaces=\"true\">The AI Factor: New Threats and Defenses<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">T<\/span><span data-preserver-spaces=\"true\">he emergence of sophisticated AI tools has fundamentally changed the threat landscape since 2022:<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">AI-Powered Threats:<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Attackers are now using deepfake technology to create convincing audio and video, making it possible for someone to impersonate your executive director on a<\/span><span data-preserver-spaces=\"true\"> &#8220;<\/span><span data-preserver-spaces=\"true\">video call<\/span><span data-preserver-spaces=\"true\">&#8221; <\/span><span data-preserver-spaces=\"true\">and request an urgent fund transfer. P<\/span><span data-preserver-spaces=\"true\">hishing emails have become increasingly sophisticated; thanks to AI, <\/span><span data-preserver-spaces=\"true\">they&#8217;re<\/span><span data-preserver-spaces=\"true\"> not only grammatically flawless but also highly personalized, making them harder to detect. Furthermore, hackers can automate the process of scanning for vulnerabilities and exploiting them, while AI-powered tools are making password cracking faster and more efficient than ever.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">AI-Enhanced Defenses:<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">T<\/span><span data-preserver-spaces=\"true\">oday, machine learning can help identify suspicious activity that deviates from typical patterns, making it easier to detect threats early. Security information and event management systems powered by AI now sift through massive amounts of data, flagging potential issues much faster than a human could. W<\/span><span data-preserver-spaces=\"true\">hen an incident does occur, automated response tools can jump into action and contain threats within seconds, minimizing damage. Additionally, behavioral analytics enable organizations to monitor for insider threats or compromised accounts by identifying when someone acts out of character.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Compliance and Legal Considerations<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">C<\/span><span data-preserver-spaces=\"true\">ultural institutions must now navigate an increasingly complex regulatory environment:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">Data Privacy Laws:<\/span><\/strong><span data-preserver-spaces=\"true\"> Compliance with GDPR (if you have European patrons), CCPA, and various state privacy laws<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Payment Card Industry (PCI-DSS):<\/span><\/strong><span data-preserver-spaces=\"true\"> Mandatory if you process credit card payments<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Breach Notification Laws:<\/span><\/strong><span data-preserver-spaces=\"true\"> Most states require notification within 30-90 days of discovery<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">D<\/span><span data-preserver-spaces=\"true\">onor Trust:<\/span><\/strong><span data-preserver-spaces=\"true\"> Failure to protect donor information can <\/span><span data-preserver-spaces=\"true\">result in loss of funding and reputational damage<\/span><span data-preserver-spaces=\"true\"> that takes years to recover from<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><strong><span data-preserver-spaces=\"true\">The True Cost of a Breach<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Beyond immediate revenue loss (like The <\/span><span data-preserver-spaces=\"true\">Met&#8217;s<\/span><span data-preserver-spaces=\"true\"> $200,000 per day), consider:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">Incident Response Costs:<\/span><\/strong><span data-preserver-spaces=\"true\"> Forensic investigation, legal fees, and remediation can cost $500,000-$2 million<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">R<\/span><span data-preserver-spaces=\"true\">egulatory Fines:<\/span><\/strong><span data-preserver-spaces=\"true\"> Up to millions of dollars for privacy law violations<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Reputation Damage:<\/span><\/strong><span data-preserver-spaces=\"true\"> Loss of donor confidence and patron trust<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Operational Disruption:<\/span><\/strong><span data-preserver-spaces=\"true\"> Staff time diverted to recovery efforts for months<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Legal Liability:<\/span><\/strong><span data-preserver-spaces=\"true\"> Potential class-action lawsuits from affected patrons or donors<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Insurance Premium Increases:<\/span><\/strong><span data-preserver-spaces=\"true\"> Cyber insurance costs will skyrocket after a breach<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><strong><span data-preserver-spaces=\"true\">Making the Business Case<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">W<\/span><span data-preserver-spaces=\"true\">hen presenting cybersecurity needs to boards and leadership:<\/span><\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li><strong><span data-preserver-spaces=\"true\">Frame it as mission protection:<\/span><\/strong><span data-preserver-spaces=\"true\"> A cyberattack <\/span><span data-preserver-spaces=\"true\">doesn&#8217;t<\/span><span data-preserver-spaces=\"true\"> just affect IT; it threatens your ability to serve your community and fulfill your mission.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Quantify the risk:<\/span><\/strong><span data-preserver-spaces=\"true\"> The Met lost approximately $1.6 million in ticket revenue during its eight-day outage, excluding recovery costs.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">C<\/span><span data-preserver-spaces=\"true\">ompare costs:<\/span><\/strong><span data-preserver-spaces=\"true\"> Investing $50,000-$100,000 annually in security is far cheaper than recovering from a $2 million breach.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Highlight regulatory requirements:<\/span><\/strong><span data-preserver-spaces=\"true\"> Non-compliance <\/span><span data-preserver-spaces=\"true\">isn&#8217;t<\/span><span data-preserver-spaces=\"true\"> optional and carries mandatory penalties.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Emphasize donor stewardship:<\/span><\/strong><span data-preserver-spaces=\"true\"> Protecting donor information is a fiduciary responsibility.<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h2><strong><span data-preserver-spaces=\"true\">Conclusion: Security Is Not Optional<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">T<\/span><span data-preserver-spaces=\"true\">he notion that cultural institutions<\/span><span data-preserver-spaces=\"true\"> &#8220;<\/span><span data-preserver-spaces=\"true\">don&#8217;t<\/span><span data-preserver-spaces=\"true\"> need to be like the Pentagon<\/span><span data-preserver-spaces=\"true\">&#8221; <\/span><span data-preserver-spaces=\"true\">is a dangerously outdated idea. In 2025, every organization that processes payments, stores personal information, or operates online is a potential target for cyberattacks. The question is not whether your institution could be attacked, but when\u2014and whether <\/span><span data-preserver-spaces=\"true\">you&#8217;ll<\/span><span data-preserver-spaces=\"true\"> be prepared.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">The Met <\/span><span data-preserver-spaces=\"true\">Opera&#8217;s<\/span><span data-preserver-spaces=\"true\"> experience should serve as both a warning and a roadmap. An eight-day offline period, significant revenue loss, and immeasurable reputational impact could have been mitigated with proper security investments. As Richard Sheinis noted, everyone is a target regardless of size or sector.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Cultural institutions hold treasures\u2014both physical and digital\u2014that enrich our communities. Protecting these assets, along with the trust of patrons and donors, requires taking cybersecurity seriously. The good news is that many attacks are preventable with proper planning, investment, and vigilance.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Don&#8217;t<\/span><span data-preserver-spaces=\"true\"> wait for your organization to make headlines for the wrong reasons. Start the cybersecurity conversation today.<\/span><\/p>\n<p><em><span data-preserver-spaces=\"true\">The term<\/span><span data-preserver-spaces=\"true\"> &#8220;<\/span><span data-preserver-spaces=\"true\">zero-day<\/span><span data-preserver-spaces=\"true\">&#8221; <\/span><span data-preserver-spaces=\"true\">refers to newly found security flaws that hackers can exploit to attack systems. The term<\/span><span data-preserver-spaces=\"true\"> &#8220;<\/span><span data-preserver-spaces=\"true\">zero-day<\/span><span data-preserver-spaces=\"true\">&#8221; <\/span><span data-preserver-spaces=\"true\">refers to the fact that the vendor or developer has <\/span><span data-preserver-spaces=\"true\">only recently discovered the fault, implying that they have<\/span><span data-preserver-spaces=\"true\"> &#8220;<\/span><span data-preserver-spaces=\"true\">zero days<\/span><span data-preserver-spaces=\"true\">&#8221; <\/span><span data-preserver-spaces=\"true\">to<\/span><span data-preserver-spaces=\"true\"> rectify <\/span><span data-preserver-spaces=\"true\">it. A zero-day attack occurs when hackers exploit a<\/span><span data-preserver-spaces=\"true\"> vulnerability before engineers have a chance to fix it.<\/span><\/em><\/p>\n<p><strong><span data-preserver-spaces=\"true\">References and Further Reading:<\/span><\/strong><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">NIST Cybersecurity Framework for Cultural Institutions<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">FBI Internet Crime Complaint Center (IC3) Reports<\/span><\/li>\n<li><a href=\"https:\/\/www.staysafeonline.org\/\"><span data-preserver-spaces=\"true\">Cybersecurity &amp; Infrastructure Security Agency (CISA) Resources for Non-Profits<\/span><\/a><\/li>\n<li><span data-preserver-spaces=\"true\">&#8220;T<\/span><span data-preserver-spaces=\"true\">he Met Opera Cyberattack: Lessons Learned<\/span><span data-preserver-spaces=\"true\">&#8221; <\/span><span data-preserver-spaces=\"true\">&#8211; Various industry publications<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Dozens of French Museums hit by Ransomware attack &#8211; Various publications.<\/span><\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why Arts Organizations Can No Longer Ignore Cybersecurity We originally wrote this up after the Met Opera was attacked. Although there have been some limited improvements in the approach of&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1495,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11,4,7,1],"tags":[],"class_list":["post-1494","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-clients","category-nami","category-technology","category-updates"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity and The Arts \u2013 2025 update &#8211; Dream Warrior Group<\/title>\n<meta name=\"description\" content=\"Cyberattacks on cultural institutions surged 40% since 2022. Discover why arts organizations are targets and how to protect them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and The Arts \u2013 2025 update\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks on cultural institutions surged 40% since 2022. Discover why arts organizations are targets and how to protect them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/\" \/>\n<meta property=\"og:site_name\" content=\"Dream Warrior Group\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dreamwarriorgrp\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-07T23:32:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thedwgblog.com\/wp-content\/uploads\/2025\/10\/cyber-security.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"507\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"DWGtalks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DreamWarriorG\" \/>\n<meta name=\"twitter:site\" content=\"@DreamWarriorG\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"DWGtalks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/cybersecurity-and-arts-2025-update\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/cybersecurity-and-arts-2025-update\\\/\"},\"author\":{\"name\":\"DWGtalks\",\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/#\\\/schema\\\/person\\\/db14853956cec1c48dd96acbffc083eb\"},\"headline\":\"Cybersecurity and The Arts \u2013 2025 update\",\"datePublished\":\"2025-10-07T23:32:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/cybersecurity-and-arts-2025-update\\\/\"},\"wordCount\":2558,\"publisher\":{\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/cybersecurity-and-arts-2025-update\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thedwgblog.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cyber-security.webp\",\"articleSection\":[\"Clients\",\"Nami\",\"Technology\",\"Updates\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/cybersecurity-and-arts-2025-update\\\/\",\"url\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/cybersecurity-and-arts-2025-update\\\/\",\"name\":\"Cybersecurity and The Arts \u2013 2025 update &#8211; Dream Warrior Group\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/cybersecurity-and-arts-2025-update\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/cybersecurity-and-arts-2025-update\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thedwgblog.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cyber-security.webp\",\"datePublished\":\"2025-10-07T23:32:08+00:00\",\"description\":\"Cyberattacks on cultural institutions surged 40% since 2022. Discover why arts organizations are targets and how to protect them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/cybersecurity-and-arts-2025-update\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/cybersecurity-and-arts-2025-update\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/cybersecurity-and-arts-2025-update\\\/#primaryimage\",\"url\":\"https:\\\/\\\/thedwgblog.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cyber-security.webp\",\"contentUrl\":\"https:\\\/\\\/thedwgblog.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cyber-security.webp\",\"width\":1024,\"height\":507},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/cybersecurity-and-arts-2025-update\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity and The Arts \u2013 2025 update\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/\",\"name\":\"Dream Warrior Group\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/#organization\",\"name\":\"Dream Warrior Group\",\"url\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/thedwgblog.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/DWG-logo_1.png\",\"contentUrl\":\"https:\\\/\\\/thedwgblog.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/DWG-logo_1.png\",\"width\":2100,\"height\":1343,\"caption\":\"Dream Warrior Group\"},\"image\":{\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dreamwarriorgrp\",\"https:\\\/\\\/x.com\\\/DreamWarriorG\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dream-warrior-group\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/#\\\/schema\\\/person\\\/db14853956cec1c48dd96acbffc083eb\",\"name\":\"DWGtalks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ec802f1f3be534884172094e044ef68c17d1d27357129b6807e6914c1e54c4b9?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ec802f1f3be534884172094e044ef68c17d1d27357129b6807e6914c1e54c4b9?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ec802f1f3be534884172094e044ef68c17d1d27357129b6807e6914c1e54c4b9?s=96&d=blank&r=g\",\"caption\":\"DWGtalks\"},\"url\":\"https:\\\/\\\/dreamwarrior.com\\\/blog\\\/author\\\/dwgtalks\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity and The Arts \u2013 2025 update &#8211; Dream Warrior Group","description":"Cyberattacks on cultural institutions surged 40% since 2022. Discover why arts organizations are targets and how to protect them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity and The Arts \u2013 2025 update","og_description":"Cyberattacks on cultural institutions surged 40% since 2022. Discover why arts organizations are targets and how to protect them.","og_url":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/","og_site_name":"Dream Warrior Group","article_publisher":"https:\/\/www.facebook.com\/dreamwarriorgrp","article_published_time":"2025-10-07T23:32:08+00:00","og_image":[{"width":1024,"height":507,"url":"https:\/\/thedwgblog.com\/wp-content\/uploads\/2025\/10\/cyber-security.webp","type":"image\/webp"}],"author":"DWGtalks","twitter_card":"summary_large_image","twitter_creator":"@DreamWarriorG","twitter_site":"@DreamWarriorG","twitter_misc":{"Written by":"DWGtalks","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/#article","isPartOf":{"@id":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/"},"author":{"name":"DWGtalks","@id":"https:\/\/dreamwarrior.com\/blog\/#\/schema\/person\/db14853956cec1c48dd96acbffc083eb"},"headline":"Cybersecurity and The Arts \u2013 2025 update","datePublished":"2025-10-07T23:32:08+00:00","mainEntityOfPage":{"@id":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/"},"wordCount":2558,"publisher":{"@id":"https:\/\/dreamwarrior.com\/blog\/#organization"},"image":{"@id":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/#primaryimage"},"thumbnailUrl":"https:\/\/thedwgblog.com\/wp-content\/uploads\/2025\/10\/cyber-security.webp","articleSection":["Clients","Nami","Technology","Updates"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/","url":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/","name":"Cybersecurity and The Arts \u2013 2025 update &#8211; Dream Warrior Group","isPartOf":{"@id":"https:\/\/dreamwarrior.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/#primaryimage"},"image":{"@id":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/#primaryimage"},"thumbnailUrl":"https:\/\/thedwgblog.com\/wp-content\/uploads\/2025\/10\/cyber-security.webp","datePublished":"2025-10-07T23:32:08+00:00","description":"Cyberattacks on cultural institutions surged 40% since 2022. Discover why arts organizations are targets and how to protect them.","breadcrumb":{"@id":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/#primaryimage","url":"https:\/\/thedwgblog.com\/wp-content\/uploads\/2025\/10\/cyber-security.webp","contentUrl":"https:\/\/thedwgblog.com\/wp-content\/uploads\/2025\/10\/cyber-security.webp","width":1024,"height":507},{"@type":"BreadcrumbList","@id":"https:\/\/dreamwarrior.com\/blog\/cybersecurity-and-arts-2025-update\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dreamwarrior.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity and The Arts \u2013 2025 update"}]},{"@type":"WebSite","@id":"https:\/\/dreamwarrior.com\/blog\/#website","url":"https:\/\/dreamwarrior.com\/blog\/","name":"Dream Warrior Group","description":"","publisher":{"@id":"https:\/\/dreamwarrior.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dreamwarrior.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dreamwarrior.com\/blog\/#organization","name":"Dream Warrior Group","url":"https:\/\/dreamwarrior.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dreamwarrior.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/thedwgblog.com\/wp-content\/uploads\/2023\/03\/DWG-logo_1.png","contentUrl":"https:\/\/thedwgblog.com\/wp-content\/uploads\/2023\/03\/DWG-logo_1.png","width":2100,"height":1343,"caption":"Dream Warrior Group"},"image":{"@id":"https:\/\/dreamwarrior.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dreamwarriorgrp","https:\/\/x.com\/DreamWarriorG","https:\/\/www.linkedin.com\/company\/dream-warrior-group\/"]},{"@type":"Person","@id":"https:\/\/dreamwarrior.com\/blog\/#\/schema\/person\/db14853956cec1c48dd96acbffc083eb","name":"DWGtalks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ec802f1f3be534884172094e044ef68c17d1d27357129b6807e6914c1e54c4b9?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ec802f1f3be534884172094e044ef68c17d1d27357129b6807e6914c1e54c4b9?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ec802f1f3be534884172094e044ef68c17d1d27357129b6807e6914c1e54c4b9?s=96&d=blank&r=g","caption":"DWGtalks"},"url":"https:\/\/dreamwarrior.com\/blog\/author\/dwgtalks\/"}]}},"_links":{"self":[{"href":"https:\/\/dreamwarrior.com\/blog\/wp-json\/wp\/v2\/posts\/1494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dreamwarrior.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dreamwarrior.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dreamwarrior.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dreamwarrior.com\/blog\/wp-json\/wp\/v2\/comments?post=1494"}],"version-history":[{"count":1,"href":"https:\/\/dreamwarrior.com\/blog\/wp-json\/wp\/v2\/posts\/1494\/revisions"}],"predecessor-version":[{"id":1496,"href":"https:\/\/dreamwarrior.com\/blog\/wp-json\/wp\/v2\/posts\/1494\/revisions\/1496"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dreamwarrior.com\/blog\/wp-json\/wp\/v2\/media\/1495"}],"wp:attachment":[{"href":"https:\/\/dreamwarrior.com\/blog\/wp-json\/wp\/v2\/media?parent=1494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dreamwarrior.com\/blog\/wp-json\/wp\/v2\/categories?post=1494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dreamwarrior.com\/blog\/wp-json\/wp\/v2\/tags?post=1494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}