Cell Phone Are Listening – And So Are the Hackers

Like most other technology, cell phones are vulnerable to cyberattacks.  Cell phones are susceptible to several different types of attacks, including the threats that were discussed during this presentation.

Cybersecurity Vulnerabilities Discovered in Police Radios

Three Dutch security analysts discovered five vulnerabilities in a police radio standard called Terrestrial Trunked Radio (TETRA) developed by the European Telecommunications Standard Institute (ETSI). This standard has been used since the 1990s and is used globally by law enforcement, militaries, critical infrastructures, and industrial control systems (ICS). These newly discovered TETRA vulnerabilities allow for […]

Cybersecurity Videos

2024 Video 4: What to Do if You Are Under Cyberattack 2024 Video 3: Spyware 2024 Video 2: Cyber Resources 2024 Video 1: Smishing 2023 Videos

Why Cybersecurity Matters

When implementing new systems and networks, ECCs should always consider cybersecurity measures in the initial plans in order to ensure that sensitive data is secured.

Cybersecurity Is Everyone’s Responsibility

It is important that every agency or organization develop guidelines on establishing effective cybersecurity strategies to include training, awareness, and incident response programs.