MCP Insights

Subscribe to Newsletter

An Introduction to Data Lakes for Public Safety and Justice Organizations

Imagine that you're a fisherman, and you need to catch a large volume and wide variety of fish. Now imagine that the fish scatter amongst numerous rivers and streams, a situation that makes your task far more time-consuming and difficult. Moreover, you risk missing some types of fish you need to catch to fulfill your mission, either because you can't find them or you run out of time.

This metaphor describes the environment in which public safety and justice organizations are working today. Many systems exist that generate or store information vital to investigators, prosecutors, judges, and corrections officials. However, many are unable to access the information when they need to do so. That's because siloes exist in these systems, making it incredibly challenging for the individual entities that comprise the public safety and justice ecosystem — the 911 community, law enforcement, prosecutors, the courts, and jails/prisons — to exchange data. Siloed systems are analogous to the rivers and streams in our metaphor.

Eleven Advanced Cybersecurity Tactics for Courts

Previous blogs presented an overview of the grave threat cyberattacks present to the justice community and essential strategies and tactics for preventing them. This blog offers intermediate and advanced strategies and tactics suggested by the Joint Technology Committee in its resource bulletin, “Cybersecurity Basics for Courts.” The committee is a joint effort of the Conference of State Court Administrators, the National Association for Court Management, and the National Center for State Courts.

Essential Tactics for Enhancing Cybersecurity in Today’s Justice Organizations

In my previous blog on cybersecurity, I provided a high-level perspective on the cybersecurity environment for justice organizations today. I noted that the environment is worrisome — it is a virtual certainty that cyberattackers, at this very moment, are looking for a way to infiltrate your organization’s networks and systems.

But I promised a progression (crawl, walk, run) that you can employ immediately to quickly begin thwarting cyberattackers and protecting your networks and systems, as well as the critical data and applications that run on them. This strategy is based on industry best practices and thought leadership to which MCP has actively contributed.[1]

Implementing a Cybersecurity Training Program is the First Line of Defense

Cybersecurity has become a huge problem for any organization that is operating networks and/or systems, but especially so for those in the government sector, particularly public-safety and justice agencies.

Are Cloud-Based Solutions Right for Your Agency?

A lot of people in the public safety/justice/public sector sectors are talking about cloud-based solutions these days. It is easy to understand why there is so much chatter because solutions that live in the cloud offer some impressive benefits. Here are just a few:

  • Cloud-based solutions typically offer best-of-breed technologies and services
  • Cloud-based solutions remove the maintenance and upgrade burden from the end user from a technology perspective
  • Cloud-based solutions often make it easier to share resources regionally or even broader compared with siloed, on-premises solutions
  • Cloud-based solutions typically offer enhanced resiliency and redundancy compared with on-premises solutions
  • Cloud-based solutions often make it easier for agencies to transfer operations to another location in “bug out” scenarios
  • Cloud-based solutions are easier and faster to scale —both up and down, based on the agency’s needs at any given juncture — compared with on-premises solutions
  • Cloud-based solutions typically are more secure, because providers often have greater information technology and cybersecurity resources and assets to draw upon

Data Integration Infographic Brings a Vast Technology Ecosystem Into Perspective

The technology ecosystem that exists in the public-safety/justice community is vast, complex and powerful. Because of its vastness and complexity, we developed an infographic to help clients more easily grasp it. Here’s what it looks like:

This Month’s Cyberchat Shines a Light on the Rise of Ransomware

Earlier this year, we ramped up our cybersecurity efforts by launching a series of monthly video chats in which we summarize the most recent threats, share information from entities such as the Federal Bureau of Investigation (FBI) and the Cybersecurity Infrastructure Security Agency (CISA), and offer tips for preventing cyberattacks and mitigating them if they occur. This month’s Cyberchat video, which can be viewed below, contains some important information that public-sector and critical infrastructure agencies need to have.

Double the Attack, Double the Fees

Double-encryption ransomware attacks, which typically include cyberattackers encrypting a target’s data twice, at the same time or shortly after each other, are on the rise. In this month’s video, we explore how agencies can mitigate the risk of a double-encryption attack and begin the rebuilding process if one occurs.

Cybersecurity Threat Advisory: Nobelium Spear Phishing Activity

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

Next Week’s CAPS Explores Public-Safety Opportunities & Challenges

Having attended dozens of educational conferences over the decade that I served as editor-in-chief of Urgent Communications and Fire Chief magazines, I know an excellent one when I see it—and I can report without fear of contradiction that the second-annual Conference for Advancing Public Safety (CAPS)—being presented by Mission Critical Partners (MCP) on June 15-16—is shaping up to be an excellent educational event.

Liability Is Another Critical Reason to Be Prudent About Cybersecurity

Cyberattacks should be on the radar of every agency in the public-safety/justice community. One of the most prevalent attacks involves ransomware, which is a specific type of malware that cyberattackers use to exploit a system vulnerability and then launch a program that encrypts the organization’s data files, essentially locking them and rendering them unusable. The cyberattacker then demands a ransom—hence the name—to provide the key that unlocks the files.

On the Road Again with MCP's New President and CEO, Darrin Reilly

Now that the Centers for Disease Control have determined that it is safe to travel for those who have received the COVID-19 vaccine, that’s just what Darrin Reilly, MCP’s president and CEO, has been doing, visiting clients from coast to coast. Recently, MCP Insights chatted with him to discover what he has learned during his travels.

Operational Change Management Depends Largely on Organizational Culture

by Michele Frankovich and Elizabeth Lenz 

The ancient philosopher Heraclitus stated that change is the only constant in life. But that isn’t quite right. Another constant is that people generally are reticent to change and will do almost anything to avoid it. That’s because change represents the unknown, which is scary.

Nevertheless, change presents opportunities. Change is how people and organizations evolve. And evolution is necessary—if people and organizations do not adapt to changing conditions, they sooner or later will encounter difficulties. For instance, people need to learn new skillsets if they want to remain competitive in the job market. Similarly, organizations need to react to changing market conditions if they want to continue serving their customers, whose needs and wants continually evolve—or in the case of government entities, their constituents.