Like most other technology, cell phones are vulnerable to cyberattacks. Cell phones are susceptible to several different types of attacks, including the threats that were discussed during this presentation.
Cybersecurity Vulnerabilities Discovered in Police Radios
Three Dutch security analysts discovered five vulnerabilities in a police radio standard called Terrestrial Trunked Radio (TETRA) developed by the European Telecommunications Standard Institute (ETSI). This standard has been used since the 1990s and is used globally by law enforcement, militaries, critical infrastructures, and industrial control systems (ICS). These newly discovered TETRA vulnerabilities allow for […]
CISA and FBI Alert for Enhanced Monitoring to Detect Advanced Persistent Threat (APT) Activity
CISA and the FBI Advisory this week to provide guidance to critical infrastructure on enhancing the monitoring of Microsoft Exchange Online environments
Cybersecurity Videos
2024 Video 4: What to Do if You Are Under Cyberattack 2024 Video 3: Spyware 2024 Video 2: Cyber Resources 2024 Video 1: Smishing 2023 Videos
Global Increase in Malicious Cyber Activity Related to COVID-1
Cybersecurity Resources
Why Cybersecurity Matters
When implementing new systems and networks, ECCs should always consider cybersecurity measures in the initial plans in order to ensure that sensitive data is secured.
Cybersecurity Is Everyone’s Responsibility
It is important that every agency or organization develop guidelines on establishing effective cybersecurity strategies to include training, awareness, and incident response programs.