MCP Insights

An Effective Way to Improve Evidence Management

Posted on July 31, 2020 by Darrin Reilly

An axiom within the criminal-justice community is that the more evidence that can be captured and leveraged by the prosecution, the better. Corollary to that axiom, however, is that evidence—regardless of type or quantity—has no utility if it is not easily accessed and shared, or worse, somehow falls through the cracks. The way to prevent such problems from occurring is to deploy a digital evidence management solution, or DEMS.

Read More

Cybersecurity Threat Advisory: Windows DNS Servers

Posted on July 28, 2020 by Mike Beagles

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their mission-critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

This week, there is a new critical alert that requires the mission-critical community’s immediate attention.

Read More

Why Critical Infrastructure Agencies Should Monitor for Exposed Credentials

Posted on July 27, 2020 by Frank Arico

The average number of breached data records, including credentials, per U.S.-based company, is an astounding number—28,500.

Read More

Public Safety Cybersecurity Threat Advisory: Cisco WebEx Vulnerability

Posted on June 30, 2020 by Mike Beagles

As part of our ongoing effort to keep our clients informed about the latest cybersecurity threats, we issue advisories whenever new threats are detected. If you would like to receive such advisories in the future, update your preferences here

Read More

If You Do Nothing Else, Implement Multifactor Authentication to Head Off Cyberattacks

Posted on May 28, 2020 by Mike Beagles

MCP’s NetInform solution leverages a variety of tools that enable our subject-matter experts to assess our clients’ communications network security postures. That assessment includes looking for vulnerabilities that could allow a bad actor to gain access to the network and then navigate through it, seeking opportunities to perform cyberattacks. Typically, a lot of vulnerabilities exist, and they’re not always easy to see. It can be something as simple as a network port being left open by a service technician after the work is done, or a former employee’s account is still active long after they left. This is problematic because numerous, easy-to-use scanning programs are readily available to hackers that enable them to probe an organization’s network to discover every open port, i.e., breach point, and attempt access.

Read More

Subscribe to Newsletter

Popular Posts