Now is the right time to become an American Federation of Musicians member. From ragtime to rap, from the early phonograph to today's digital recordings, the AFM has been there for its members. And now there are more benefits available to AFM members than ever before, including a multi-million dollar pension fund, excellent contract protection, instrument and travelers insurance, work referral programs and access to licensed booking agents to keep you working.
As an AFM member, you are part of a membership of more than 80,000 musicians. Experience has proven that collective activity on behalf of individuals with similar interests is the most effective way to achieve a goal. The AFM can negotiate agreements and administer contracts, procure valuable benefits and achieve legislative goals. A single musician has no such power.
The AFM has a proud history of managing change rather than being victimized by it. We find strength in adversity, and when the going gets tough, we get creative - all on your behalf.
Like the industry, the AFM is also changing and evolving, and its policies and programs will move in new directions dictated by its members. As a member, you will determine these directions through your interest and involvement. Your membership card will be your key to participation in governing your union, keeping it responsive to your needs and enabling it to serve you better. To become a member now, visit www.afm.org/join.
March 1, 2017IM -
by Walter Lopez, AFM Information Systems Manager
It is becoming more common for businesses to be affected by malware and ransomware, and musicians are not immune. Recently, several orchestras have experienced data breaches of employee databases. Malware is any software intended to damage or disable a computer or other software programs. Ransomware is a type of malware that stops you from using your PC by holding your PC or files for “ransom.” Following are a few tips from Microsoft to help you avoid becoming a ransomware or malware victim.
There are different types of ransomware. However, all of them will prevent you from using your computer normally, and they will all ask you to do something (pay a “ransom”) to remedy the situation. They can target any user—home computers, endpoints to enterprise networks, or servers used by anyone from a small company to a government agency. Well-known cases include: Los Angeles Valley College, which paid $28,000 in bitcoin ransom; Carleton University in Ontario, which paid about $39,000 in bitcoin ransom, and San Francisco’s light rail transit system, which was able to restore its system without paying.
Specifically, ransomware can prevent you from accessing Windows, encrypt your files so that you cannot use them, and can stop certain applications (like web browsers) from running on your system. The hackers behind the ransomware may demand you pay money or complete a survey. However, there is no guarantee that after you’ve paid your ransom you will regain full access.
Ransomware and other malware can arrive through your email. Malware authors often use tricks to try to convince you to download malicious files. This can be an email with a file attached that tells you it is a receipt, refund, or an invoice. When you open the attachment, you install malware on your PC.
Sometimes a malicious email is easy to spot—it may have bad spelling and grammar, or come from an email address you’ve never seen before. However, these emails can also look like they came from someone you know. Some malware hacks into email accounts and sends malicious spam to the contacts it finds.
To help avoid becoming a victim of email fraud and malware, follow these tips:
Malware worms can spread by infecting removable drives such as USB flash drives or external hard drives. The malware may be automatically installed when you connect the infected drive to your PC. Some worms can also spread by infecting computers that are connected on a network.
To avoid this type of infection:
Some malware is installed along with programs that you download. This includes software from third-party websites or files shared through peer-to-peer networks. Some programs will also install other unwanted software such as tool bars or programs that display extra ads as you browse the web. Usually you can opt-out and not install these extra applications by unticking a box during the installation.
Programs used to generate software keys (keygens) often install malware at the same time. Microsoft security software finds malware on more than half of PCs with keygens installed.
For more information visit the website: https://www.microsoft.com/en-us/security/portal/mmpc/default.aspx.