Vulnerability Management is Best Achieved via a Risk-Based Approach
The National Institute of Standards and Technology (NIST) defines a cybersecurity vulnerability as a weakness in:
Topics: Cybersecurity
The National Institute of Standards and Technology (NIST) defines a cybersecurity vulnerability as a weakness in:
Topics: Cybersecurity
Last week I attended the IJIS Institute’s first community forum in Austin, Texas, with several MCP senior-level colleagues, including Joe Wheeler, who chairs the IJIS Institute’s board of directors.
Every organization should have a cybersecurity program to prevent — ideally — and mitigate cyberattacks. This is especially true of public safety and justice organizations that increasingly find themselves in the crosshairs of cyberattackers.
As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.
Topics: Cybersecurity
It’s scary out there. Cyberattackers get better at what they do, and come up with new ways of creating havoc, seemingly by the hour. When I think about this, my mind immediately draws a parallel between cybersecurity professionals and automobile mechanics. There’s a lot that can go wrong with an automobile, and it’s in the best interest of mechanics to have a very robust toolbox. Prevention also is vitally important, e.g., performing oil changes and transmission flushes at the prescribed intervals. It works much the same way when trying to protect networks, systems, and devices from cyberattacks.
Topics: Cybersecurity
Mission Critical Partners strives to add new capabilities that enable it to provide new and better service to its clients. This is especially important because the environment constantly evolves in the public safety and justice ecosystem where our clients live, often at warp speed.
Cybersecurity is vitally important in today’s world of highly interconnected networks, systems, and devices. Every day it feels as if we’re barraged with a plethora of threats. Most of us want to try to get through the day without doing something that leads to a cyberattack that compromises infrastructure, disrupts operations, or leads to a data breach. Data breaches are especially egregious for public safety and justice organizations because of the sensitive data they possess.
Last week we attended eCourts 2022, a biennial conference that focuses on the technology needs of court systems and the personnel who work for them. Several trends quickly became apparent to us.
Topics: Cybersecurity, Criminal Justice
A new critical security alert requires the mission-critical community’s immediate attention, and this one is regarding LockBit ransomware, which has become the prominent ransomware group based on its high volume of attacks in recent months.
Topics: Cybersecurity
A previous blog discussed the importance of penetration testing as part of a comprehensive
Topics: Cybersecurity
In terms of cybersecurity, every organization exists in a zero-trust environment. Cyberattackers are
Topics: Cybersecurity
A new critical security alert requires the mission-critical community’s immediate attention.
Topics: Cybersecurity
How can we support your mission? From design and procurement to building and management, our national team of experts is here to help…because the mission matters.
Click the button below to sign up for our newsletter.
SIGN UP