Last week, ABC obtained a bulletin from the Department of Homeland Security that outlined concerns about potential cyber attacks against the Emergency Services Sector. The bulletin noted the sector could be exploited and mined for sensitive data and would disrupt medical and law enforcement services.
As you probably know, when ransomware disrupts public safety operations networks, personnel are forced to revert to manual dispatching and recording by pen and paper to sustain operations.
The DHS’ analysis notes what we already know, that these networks are prime targets for cyber attacks due to how highly sensitive systems are for emergency services. It additionally highlights rising geopolitical tensions as well as the upcoming election cycle.
Two notable cyber attacks this year that severely disrupted networks were Bucks County, PA and Fulton County, GA. You can find more details on those attacks in our cyber attack archive. https://seculore.com/recent-cyber-attacks/
Remember that cyber attack groups like to target the lowest hanging fruit in order to gain access to networks.
Possible Cyber Attack Vectors
- Misconfigured firewalls
- Unpatched software
- Third-party vendors
- Exploitable vulnerabilities
- Overwhelmed networks and personnel not trained to recognize phishing threats
Preventative Techniques and Best Practices
- Network segmentation
- Limit access and privileges
- Zero-trust practices where possible
- Strong password policies
- MFA
- Cyber training staff members
- Vigilance and attack surface management
Cybersecurity Resources
Review what is involved in some of these best practices from our cyber experts in our free, on-demand webinar, Practical Principals for PSAPs.
Preventative measures are the most proven tactics at preventing severe damages from cyber threats. Learn more about how to find your network’s vulnerabilities by contacting us today about a vulnerability assessment.
Other Resources
- Cybersecurity Awareness Month 2024: Steps to Secure Your Network
- Strengthen Your Defenses: The Essential Steps for Conducting a Cybersecurity Gap Analysis
- Insider Threat Awareness: Protecting Your Network From Within
- Practical Cybersecurity Principles for PSAPs | eBook
- Understanding the New CJIS Cybersecurity Requirements: A Guide