MCP Insights

Subscribe to Newsletter

Cybersecurity Threat Advisory: SolarWinds Orion Backdoor

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

Cybersecurity Threat Advisory: Vector Multicast Routing Protocol

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their mission-critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

Cybersecurity Threat Advisory: Major ‘Vishing’ Campaign

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their mission-critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

How Mission-Critical Organizations Can Leverage Penetration Testing to Protect Against Cyberattacks

Amid efforts to expose cybersecurity vulnerabilities in a network before an attacker does, penetration testing, also referred to as a pen test or a white-hat attack, continues to gain momentum as a viable means to detect weaknesses in an organization’s network infrastructure.

If the term penetration testing is foreign to you, it is not as intrusive as it sounds. The objective of a penetration test is to provide information technology (IT) and system managers with critically needed intelligence regarding their organization’s security vulnerabilities. Whether the testing is performed manually or via sophisticated automation tools, it is best conducted by a third party that can use the same tools many hackers rely on. Many of these tools are widely available, arming testers with a better understanding of how they can be used to attack an organization.

Public Safety Needs to Make Itself Heard Regarding the FCC’s 6-GHz Order

In April, the Federal Communications Commission issued an order that enables unlicensed devices to share 1200 megahertz (MHz) of spectrum in the 6 gigahertz (GHz) band, to meet the growing demands for wireless broadband services.

The FCC cited in its order a Cisco report that projects mobile data traffic will more than double between 2017 and 2022. It also cited an Ericsson report that predicts the average amount of data per month used by a smartphone will increase from 7 gigabytes (GB) in 2018 to 39 GB by 2024. A large portion of this mobile data traffic is expected to be delivered on an unlicensed basis utilizing Wi-Fi, Bluetooth and similar protocols. 

Public Safety Cybersecurity Threat Advisory: Cisco WebEx Vulnerability

As part of our ongoing effort to keep our clients informed about the latest cybersecurity threats, we issue advisories whenever new threats are detected. If you would like to receive such advisories in the future, update your preferences here

If You Do Nothing Else, Implement Multifactor Authentication to Head Off Cyberattacks

MCP’s NetInform solution leverages a variety of tools that enable our subject-matter experts to assess our clients’ communications network security postures. That assessment includes looking for vulnerabilities that could allow a bad actor to gain access to the network and then navigate through it, seeking opportunities to perform cyberattacks. Typically, a lot of vulnerabilities exist, and they’re not always easy to see. It can be something as simple as a network port being left open by a service technician after the work is done, or a former employee’s account is still active long after they left. This is problematic because numerous, easy-to-use scanning programs are readily available to hackers that enable them to probe an organization’s network to discover every open port, i.e., breach point, and attempt access.

The Case for Private Long-Term Evolution Networks for Power Utilities

Next month, the Federal Communications Commission (FCC) is expected to vote on reconfiguring the 900 MHz band for the deployment of broadband services and technologies. This is an important issue that Mission Critical Partners (MCP) has been tracking for some time, and we are encouraged to see a conclusion on the horizon. 

The Role of LTE in the Utilities Sector

Southern Company is one of the largest investor-owned utilities in the United States, covering a large portion of the southeast. The company is known for being an early adopter of telecommunications technologies. Its subsidiaries include Southern Telecom and Southern Linc, companies dedicated to serving the telecommunications needs of power subsidiaries and charged with reselling any surplus capacity to outside entities. The Southern-owned, multistate, Motorola Integrated Digital Enhanced Network (iDEN) primarily was used by energy companies, but also by other commercial enterprises and even by some public safety entities.

Utility Communications Networks Resemble a Spider’s Web

Last fall I attended a conference presented by the Utility Broadband Alliance (UBBA), which caters to utility companies that are interested in using wireless broadband technologies for their operational needs.