MCP Insights

Subscribe to Newsletter

Recent Posts

When It Comes to Cybersecurity, Prevention Should Be the Goal

Recently a colleague asked me to identify some of the scariest cybersecurity trends we’re seeing in the public safety and justice sectors — and one immediately sprang to mind.

Topics: Cybersecurity

Vulnerability Management is Best Achieved via a Risk-Based Approach

The National Institute of Standards and Technology (NIST) defines a cybersecurity vulnerability as a weakness in:

Topics: Cybersecurity

Cybersecurity Governance and Why It’s an Indispensable Element of Effective Cybersecurity Planning

Every organization should have a cybersecurity program to prevent — ideally — and mitigate cyberattacks. This is especially true of public safety and justice organizations that increasingly find themselves in the crosshairs of cyberattackers.

Cybersecurity Threat Advisory: Increased Qakbot Use to Bypass Endpoint Protection

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

Topics: Cybersecurity

There Are Major Multifactor Authentication Benefits, but It’s No Silver Bullet

It’s scary out there. Cyberattackers get better at what they do, and come up with new ways of creating havoc, seemingly by the hour. When I think about this, my mind immediately draws a parallel between cybersecurity professionals and automobile mechanics. There’s a lot that can go wrong with an automobile, and it’s in the best interest of mechanics to have a very robust toolbox. Prevention also is vitally important, e.g., performing oil changes and transmission flushes at the prescribed intervals. It works much the same way when trying to protect networks, systems, and devices from cyberattacks.

Topics: Cybersecurity

The Importance of an Incident Response Plan

Cybersecurity is vitally important in today’s world of highly interconnected networks, systems, and devices. Every day it feels as if we’re barraged with a plethora of threats. Most of us want to try to get through the day without doing something that leads to a cyberattack that compromises infrastructure, disrupts operations, or leads to a data breach. Data breaches are especially egregious for public safety and justice organizations because of the sensitive data they possess. 

Fundamental Aspects of a Strong Vulnerability Management Program

Many organizations are pursuing more robust, proactive measures for managing vulnerabilities in their information technology (IT) environments due to massive cybersecurity breaches.

Topics: Cybersecurity

Cyber Tip of the Week: EDR, XDR, and MDR

The cybersecurity landscape constantly is evolving – and navigating it is a challenge for information technology (IT) teams large and small.

Cybersecurity Threat Advisory: Microsoft Critical Remote Code Execution Vulnerability

Advisory Overview

The Cybersecurity and Infrastructure Security Agency (CISA), a unit of the Department of Homeland Security (DHS), has issued an alert regarding an advisory released by Microsoft concerning a critical remote code execution vulnerability.