Why Critical Infrastructure Agencies Should Monitor for Exposed Credentials
The average number of breached data records, including credentials, per U.S.-based company, is an astounding number—28,500.
The average number of breached data records, including credentials, per U.S.-based company, is an astounding number—28,500.
The cybersecurity problem that public safety agencies have is very big and it’s not going away—if anything, it’s only going to expand as time passes. That was the consensus of a panel convened for MCP’s inaugural Conference for Advancing Public Safety, which was presented last month.
“The threat’s there—something is going to happen, and we need to be prepared for it,” said Thomas Stutzman, director, Indiana County (Pennsylvania) Emergency Management Agency.
First responders historically have arrived at an emergency scene armed with only the information that emergency communications center (ECC) telecommunicators extracted while talking with a 911 caller. However, such callers usually are experiencing one of the worst moments of their lives, which makes it extremely difficult, if not impossible, for most to deliver complete, coherent information. As a result, first responders are left to piece together what to expect upon arrival.
Many emergency communications centers (ECCs) across the United States are migrating toward Next Generation 911 (NG911) systems because their advanced capabilities make them a quantum leap forward from legacy 911 systems. The biggest benefit is that the geospatial data generated by geographic information systems (GIS) is much more accurate than the automatic location identification (ALI) and master street address guide (MSAG) data used in legacy systems.
Because of this, geospatial data will be used in the NG911 environment to locate emergency callers, resulting in fewer misrouted 911 calls, which will save precious time when lives are on the line. Roughly two decades ago, the Federal Communications Commission (FCC) conducted a study of emergency incidents in the Salt Lake City area; extrapolating the data findings, the commission concluded that about 10,000 additional lives could be saved each year for every one-minute reduction in emergency-response time.
A lot of data is being collected about 911 service in the United States by a plethora of government entities at all levels. The data collected by everyone—from local and regional authorities to the Federal Communications Commission (FCC)—is used for a variety of reasons:
As part of our ongoing effort to keep our clients informed about the latest cybersecurity threats, we issue advisories whenever new threats are detected. If you would like to receive such advisories in the future, update your preferences here.
A previous post examined some of the key technology factors that should be considered as the public safety community mulls how to evolve its communications capabilities going forward. This post explores operations, governance and funding considerations.
Profound challenges often spur great progress. The COVID-19 pandemic is no exception. Not only is the public safety community staring an enormous challenge in the face, but also is looking at a tremendous opportunity to move the community forward.
Traditionally, public safety has been slow to adopt new technologies and embrace new strategies. However, the pandemic has forced agencies to do things they likely would not have contemplated before. The collection of new concepts not only will enable public safety to handle the pandemics and mega-disasters of the future, but also will enhance day-to-day operations personnel performance. Public safety is up to the challenge, as long as officials can get comfortable with being uncomfortable for a while.
In a recent post, I touched upon some of the novel ways that the public safety community has responded to the COVID-19 pandemic. In this post I’ll explore some of the most important lessons that have been learned.
First and foremost, all public safety agencies need continuity-of-operations (COOP) and disaster-recovery (DR) plans. We have roughly 150 subject-matter experts, and as they travel the country supporting clients, they often discover the complete lack of such plans and/or they come to realize that they haven’t been updated for quite some time. This always amazes me. Every agency should have such plans. As Benjamin Franklin said, “by failing to prepare, you are preparing to fail.” While the pandemic has brought this need into sharp focus, there are many events—tornados, floods, earthquakes, wildfires, hurricanes, hazmat incidents—that could render an emergency communications center inoperable, inaccessible or uninhabitable.
Sometimes you don’t have a choice—an event occurs that is so cataclysmic that you are forced to do things you had no idea you were capable of doing, and certainly no desire to do them. Here’s a for instance. On December 6, 1941, the United States continued on its slow but steady recovery from the Great Depression, content in the cocoon of its isolationism. Things were getting better, fueled in part by the New Deal. And then Japan bombed Pearl Harbor the next day. In an instant, the U.S., its citizens, and their way of life were turned upside down—and a lot of things changed very quickly as a result.
As states begin to reopen and communities slowly return to normalcy, organizations, including mission-critical agencies, must evaluate their responses to the COVID-19 public-health crisis and leverage their experiences to prepare for future crises. Conducting an incident-response review, also called a hot wash, enables agencies to identify areas in which they performed well, as well as where their responses could use improvement. When conducted as part of an agency’s after-action reporting activities, this review can help build a better incident-response plan moving forward.
MCP’s NetInform solution leverages a variety of tools that enable our subject-matter experts to assess our clients’ communications network security postures. That assessment includes looking for vulnerabilities that could allow a bad actor to gain access to the network and then navigate through it, seeking opportunities to perform cyberattacks. Typically, a lot of vulnerabilities exist, and they’re not always easy to see. It can be something as simple as a network port being left open by a service technician after the work is done, or a former employee’s account is still active long after they left. This is problematic because numerous, easy-to-use scanning programs are readily available to hackers that enable them to probe an organization’s network to discover every open port, i.e., breach point, and attempt access.
How can we support your mission? From design and procurement to building and management, our national team of experts is here to help…because the mission matters.
Click the button below to sign up for our newsletter.
SIGN UP