Every 2nd Wednesday of the month we will be bringing a new Cybersecurity topic focused on issues facing Public Safety today!
Clink on the link below to register for our upcoming webinar:
"Preparing ECC Leadership For Cyber Attacks"
Below is a list of our past webinars. Click read more to gain access to the recordings of each subject.
News reports are full of stories in which hackers have attacked public safety agencies – such as 911 Centers, Police Departments, Sheriff Offices, Fire Departments and others. Based upon hundreds of public safety networks that SecuLore has monitored and evaluated, we have amassed many examples of how hackers can and are attacking us. It is time to learn from these investigations!
Too often we read news articles about counties and cities that have been hit by ransomware. In many of these instances, public safety has also been affected. These local governments and agencies must face a difficult decision: "Should we pay the ransom?" As part of a good Incident Response Plan, this topic should be addressed in advance of the emotion surrounding a cyber-crisis.
Counties and Cities across the country have been hit by crippling cyber-attacks and have made the news (far too frequently). Because so much of our Public Safety infrastructure is embedded in these networks, these attacks will often have a serious impact on our Public Safety response.
There are so many demands on your limited 9-1-1 funds. Now you must add Cybersecurity – a new draw on your resources. The number one problem that victims of cyber-crime cite is lack of funding to do the things that they know they needed to do. How can you find the funds to pay for these much-needed capabilities?
We’ve seen the statistics - Emergency Communication Centers, Police Departments and their County and City Governments are all being targeted by hackers at a growing rate. But why would someone target those who seek to protect the public and provide them services? How would a hacker get into these critical systems, and what can we do to stop them?
It is each person’s responsibility to help keep our mission-critical Public Safety infrastructure safe. But what if you aren’t an IT person? What if (shudder the thought) you don’t even like technology? What you can you do to help? The answer: a lot!
As more of the devices we use connect to the internet, we need to be mindful of the technology related behaviors we allow in our 9-1-1 centers. Does your center have cybersecurity policies? Do you know what they are or when they were last updated?
The best firewalls can be bypassed by sophisticated phishing attacks or unpatched servers exposed to the internet. Hackers can penetrate a firewall where the rules are entered too broadly or where the complex rules made mistakes easy to make. Learn how to properly configure your firewalls to improve your cyber-resiliency.
The past year has seen a growing number of cyber attacks targeting emergency communications. In 2018 we recorded over 200 publicly reported cyber attacks that impacted local governments and public safety. Join us as we review the most critical attacks of the year, learning from their challenges and successes.
Protecting our 9-1-1 Emergency Communication Centers (ECCs) from cyber-attacks involves more than just technology. Your staff's actions are a key part of your cyber-health, and can be a critical asset if they are properly trained. Unfortunately, whether accidental or intentional, your staff can also be the source of disruption.
Over the last several months we have discussed a variety of attacks: Ransomware, Cryptojacking, Advanced Persistent Threats, DDoS/TDoS and others. We’ve seen criminals and state actors use these techniques for targeted attacks against our public safety infrastructure. In this webinar, we will talk about how to address these attacks head-on.
Concerns about Russians cyber-hackers meddling with our elections has been a hot news topic for a very long time now. What is important to understand is that the types of attacks attributed to foreign states are not the flashy, make-the-news ransomware types of attacks. They are insidious; they dig deep and laterally; they hide. They are known as Advanced Persistent Threats (APT).
According to recent news, ransomware attacks overall have fallen sharply in 2018; however, Public Safety doesn’t always follow the general trends. There is more at stake, and certain hacking techniques might be more effective against the more isolated public safety infrastructure.
Many Cyber experts talk about the importance of a Vulnerability Assessment. So what does it cover? As you fret about keeping your Center safe from the hundreds of cyberattacks you continually hear about in the news, what exactly is this tool and how does it help?
Ransomware is a $2B business – cybercrime is rising at an alarming rate – new forms of cyber attacks like cryptojacking are emerging, and all of these are targeted at our public safety agencies. In this on demand webinar, we discuss the specific types of steps you can take to protect your PSAP, Dispatch Center or police/fire/EMS department.
Secure communications are considered to be a way to keep our centers safe. Unfortunately, secure does not necessarily mean safe – it means encrypted. Once hackers are able to break into a network via phishing or brute force hacking, they can use your secure communications against you. This makes it harder to identify what data they are sending or receiving and more difficult for you to recover from a cyber-attack.
As our cities become smarter and we deploy Internet of Things devices both inside and outside our centers, we become ever more interconnected to IP-based networks. These advances bring great benefits to all parties: citizens, 911 telecommunicators, dispatchers and first responders. However, they also bring new and different vulnerabilities for which public safety will need to be prepared.
Will crypto-mining become a new attack method on Public Safety agencies? If a hacker can use your system to crypto-mine, then he can make cryptocurrencies for free and have your PSAP paying for it, all while causing serious degradation of your systems’ performance.
In honor of Valentine’s Day, wanted to introduce you to your secret admirers: hackers seeking access to your DNS. Cyber criminals love DNS traffic because they can easily use it to exfiltrate data. In order to help you address these unwanted advances, we discuss helpful techniques that will keep these "bad boys" at bay.
Bad actors had a busy year in 2017: cyber threats continued to grow – the world witnessed the largest global attacks in history – the Dark Web exploded with cyber-attacks that even the novice can use. This webinar focuses on attacks that impacted our 911 centers and our ability to send and coordinate our first responders. We give insights into what public safety systems should expect to see in 2018, and what you can do now to make the new year more secure.
Thanksgiving Day 2016, a relatively small PSAP was hit with a devastatingly large cyber attack in which they almost lost their entire 9-1-1 call taking capabilities. In looking back, we have seen this scenario repeated over a hundred times. What new insights have we learned one year later?
Did you know that the average cybercriminal activity goes over 200 days before detection? APCO warned Public Safety agencies to check for malicious Russian activity – has your agency followed the warning? Ransomware is a multi-step process – do you know the steps and what to look for?
Denial of Service attacks are popular techniques for cyber-thugs to wreak havoc on our 9-1-1 systems. Telephony Denial of Service (TDoS) can impact the ability for our PSAPs to receive 9-1-1 calls from our citizens or impair the use of public safety administrative lines. Distributed Denial of Service (DDoS) attacks can shut down a PSAP’s data communications, making it impossible to retrieve and share information.
Every day, you respond to a crisis: an accident, a fire, a robbery. For each crisis, you have a plan on how to respond, how to manage the chaos. But what happens when you become the center of the crisis? If your public safety agency is hit by a cyber-attack, you become the victim – and you will want to have a planned response.
Cyber attacks have become big news, and our public safety infrastructure is feeling the effects. Police departments and 911 systems have been hit in 20 different states already. Here we will take a closer look at how hackers are trying to affect our public safety networks and focus on the areas where they've already succeeded.
The Internet of Things (IoT) promises many positive improvements to make our cities "smarter" by inter-netwoking ourpersonal, IP-enabled buildings, and other items that have the capabilities to connect these devices in ordert to collect and exchange data. Many of these changes are expected to enhance our Public Safety infrastructure.
From DDos to TDos – Ransomware to Malware - Idaho to Ohio to Georgia – our Public Safety infrastructure is under attack in an ever-changing environment. Educating yourself about the latest attacks is an important part of keeping your information secure and protecting your center!
PSAPs are always at risk for an attack, even on holidays. This past Thanksgiving, a very publicized phishing attack successfully shut down San Francisco’s ability to collect fares for their Municipal Transit Agency, allowing free rides for customers, but likely costing the city millions of dollars. Meanwhile, and with far less public scrutiny, one of our country’s PSAPs was hit by the very same hacker. In this webinar we will show how a creative IT team managed to save their PSAP from losing all of the call-taker stations, and learn some good lessons for your public safety agency.
There are steps you can take to make the likelihood of a cyber attack on your public safety center minimal or nonexistent. Increase your cybersecurity posture by up to 40% by making the small but meaningful changes to your browsing habits outlined in our webinar.
DHS and the Director of National Intelligence published a Joint Analysis Report describing Russian malicious activity associated with election security compromises. APCO issued a statement, saying it "highly encourages that your organization look within your network traffic for signs of malicious activity.