MCP Insights

Subscribe to Newsletter

Cybersecurity Threat Advisory: Nobelium Spear Phishing Activity

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

Operational Change Management Depends Largely on Organizational Culture

by Michele Frankovich and Elizabeth Lenz 

The ancient philosopher Heraclitus stated that change is the only constant in life. But that isn’t quite right. Another constant is that people generally are reticent to change and will do almost anything to avoid it. That’s because change represents the unknown, which is scary.

Nevertheless, change presents opportunities. Change is how people and organizations evolve. And evolution is necessary—if people and organizations do not adapt to changing conditions, they sooner or later will encounter difficulties. For instance, people need to learn new skillsets if they want to remain competitive in the job market. Similarly, organizations need to react to changing market conditions if they want to continue serving their customers, whose needs and wants continually evolve—or in the case of government entities, their constituents.

EMS Technology is Evolving to Ease, and Eventually End, Billing Woes

A previous post touched upon the difficulties that emergency medical service (EMS) agencies experience when trying to bill and then collect payment for the services that they provide. Those difficulties are considerable and have plagued the sector for as long as EMS has existed. Hundreds of millions of dollars go uncollected across the sector each year. For instance, an EMS study for one of MCP's clients wrote off $7 million last year because of an inability to bill for EMS services. That’s a big number.

Many EMS agencies across the United States are in similar circumstances. This makes it much more difficult for agencies to maintain their service-delivery models, pay salaries and benefits, ensure that existing equipment is operational, and upgrade or replace equipment that has reached or is approaching end of life.

The Seven Best Cybersecurity Resolutions for the New Year

Cybersecurity continues to be a persistent problem for government agencies, including those operating in the public safety and justice sectors. These entities must be constantly vigilant in their efforts to prevent breaches, a task made incredibly difficult given the ingenuity of cyberattackers, the fact that the number of attacks continues to increase at a dizzying pace, and the reality that attack vectors evolve seemingly by the hour. Nevertheless, while fighting the battle isn’t easy, it is essential.

MCP Makes Best-of-Breed Technology Procurements Easy and Painless

Since the firm’s launching 12 years ago, Mission Critical Partners has participated in hundreds of technology procurements. We are proud that our clients trust the support that we provide. The foundation for that trust can be found in two important factors.

Cybersecurity Threat Advisory: Egregor Ransomware

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

This week, there is a new critical alert that requires the mission-critical community’s immediate attention.

Advisory Overview

The ransomware-as-a-service variant “Egregor” is spiking across the cybersecurity and information technology (IT) landscape after the shutdown of the notorious Maze ransomware campaign. Some major organizations have fallen victim to the malware, including Kmart, Cencosud (a retail giant in South America), Randstad NV (the world’s largest staffing company and owner of Monster.com), and Translink (Vancouver’s bus and rail transportation system).

The ransomware has been seen hijacking printers and repeatedly printing the ransom note. In the case of retail organizations, the ransom note has been printing on consumers’ receipts at checkout. Mission Critical Partners recommends deploying advanced endpoint protection to block ransomware pre-execution.

Cybersecurity Threat Advisory: Ryuk Ransomware Activity Targeting the Healthcare and Public Health Sector

As part of our effort to inform our clients about potentially serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

Cybersecurity Threat Advisory: Heightened Attack Activity Involving Trickbot Variant 'Bazar Backdoor'

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their mission-critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

How Mission-Critical Organizations Can Leverage Penetration Testing to Protect Against Cyberattacks

Amid efforts to expose cybersecurity vulnerabilities in a network before an attacker does, penetration testing, also referred to as a pen test or a white-hat attack, continues to gain momentum as a viable means to detect weaknesses in an organization’s network infrastructure.

If the term penetration testing is foreign to you, it is not as intrusive as it sounds. The objective of a penetration test is to provide information technology (IT) and system managers with critically needed intelligence regarding their organization’s security vulnerabilities. Whether the testing is performed manually or via sophisticated automation tools, it is best conducted by a third party that can use the same tools many hackers rely on. Many of these tools are widely available, arming testers with a better understanding of how they can be used to attack an organization.

Why Critical Infrastructure Agencies Should Monitor for Exposed Credentials

The average number of breached data records, including credentials, per U.S.-based company, is an astounding number—28,500.

What’s Next? Conducting an Incident Response Review

As states begin to reopen and communities slowly return to normalcy, organizations, including mission-critical agencies, must evaluate their responses to the COVID-19 public-health crisis and leverage their experiences to prepare for future crises. Conducting an incident-response review, also called a hot wash, enables agencies to identify areas in which they performed well, as well as where their responses could use improvement. When conducted as part of an agency’s after-action reporting activities, this review can help build a better incident-response plan moving forward.