https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

View From The Top


Commentary

911 dispatch centers can take multiple steps to combat cyberattacks

911 dispatch centers can take multiple steps to combat cyberattacks

  • Written by Dan Retzer
  • 15th November 2019

There are more than 6,000 dispatch points throughout the United States, and this vital emergency service is now under constant threat, because hackers are infiltrating dispatch centers and rerouting calls away from dispatchers.

Malware and spear-phishing attacks impact emergency service dispatch centers without warning. There’s no siren going off to alert a dispatcher about a problem at their workstation, so it might seem impossible to fight back.

But 911 dispatch centers can manage these threats by developing and adhering to smart cybersecurity procedures. They need to adopt protective measures, and leverage industry resources, to address their needs. Municipalities that take these issues seriously can protect their IT infrastructure and ensure that they continue to address public-safety needs every minute of every day.

Anatomy of a Hack

Picture this: Accidental 911 calls flood emergency centers across America after a hacker sends a spam link to thousands of mobile phones. If anyone clicks the link, their device starts dialing 911 repeatedly. So many calls are received that emergency dispatchers can’t tell which ones are legitimate, and the onslaught makes it impossible to answer every call.

This example isn’t the plot of the latest Hollywood thriller—it happened in October 2016. More recently, cities in Maryland and Texas fell victim to similar hacks. More than 40 cyberattacks have targeted 911 call centers in the last three years.

Hackers send fake password-reset requests that, if opened, grant access to entire emergency-response systems. They can also take advantage of bring-your-own-device (BYOD) policies that are sometimes lax. A personal cell phone, laptop, or thumb drive that isn’t adequately protected can infect an entire network, if hackers gain access.

As such, 911 dispatch supervisors and other public safety executives need to change their approach to security. The days of the “walled garden” where access to content is controlled in a closed environment are long gone. Today, multiple departments share access to information to enable better collaboration and improve response times. It’s essential to watch for threats and quickly stop any attackers who breach defenses.

Thankfully, emergency-response organizations don’t have to fight these battles on their own. They can use tech tools to patch systems, assess risks, and train their staff to turn the tables on hackers.

Head to the Cloud—and Beyond

Many 911 call centers have limited resources, so they must perform their own IT maintenance. The problem is that many of these offices work with vulnerable legacy software housed on outdated servers. Fortunately, emergency departments can resolve these issues without adding new on-premise equipment.

Cloud-based solutions can securely store the applications and data needed for dispatch centers and multiple emergency response departments. Experienced cloud providers adhere to the FBI’s Criminal Justice Information Services Division (CJIS) compliance standards to ensure the best security measures are in place. Besides enabling better collaboration between municipal departments, cloud-based solutions offer automated maintenance updates. Automation dramatically alleviates a lot of the IT workload. Cloud-based solutions also offer pay-as-you-go models that eliminate costly hardware purchases and reduces total cost of ownership.

However, regardless of the deployment option an agency chooses, employees should defend their workplaces and learn to recognize online attacks.

A Culture of Security

Each 911 dispatch center needs a clearly defined cybersecurity policy that involves regular risk assessments. Leading industry groups like the National Emergency Number Association (NENA) and the Association of Public Safety Communications Officials (APCO) can provide valuable resources, training, and assistance.

Dispatch managers can also adapt general frameworks from the International Organization for Standardization (ISO) to fit their 911 call-center demands. Given the fact that each municipality operates differently, emergency departments should also contract a security firm to audit the agency’s systems and make recommendations.

Once all cybersecurity policies and procedures are in place, employees need regular training to put them into practice to keep threats at bay. All 911 dispatchers need to learn how to recognize and stop cyber threats. They also should collaborate to stay informed and keep everyone on the offensive. Team leaders need to reinforce these ideas regularly and evolve rules to fit the ever-changing digital world. They should focus on prevention and ensure the IT infrastructure protects the entire supply chain.

Hacks and data breaches have become a fact of life, but 911 call centers can’t afford to lose service for even a second. Dispatch-center managers need to secure assets using cloud-based tools and automation while training staff on how to recognize cyberattacks. Emergency responders who safeguard online resources can focus on their life-saving work without worrying about cyber threats.

Dan Retzer is senior vice president of global product development for Hexagon Safety & Infrastructure.

 

Tags: homepage-featured-4 Alerting Systems APCO Dispatch/Call-taking NENA PSAP Commentary Standards System Design System Installation System Operation Tracking, Monitoring & Control View From The Top Commentary

Most Recent


  • Intelsat, OneWeb team on in-flight connectivity
    UK-government backed OneWeb and US-based Intelsat are joining forces to offer in-flight connectivity services to airlines, combining the former’s low-Earth-orbit (LEO) satellite service with the latter’s geostationary (GEO) satellites to “harness the power of multi-orbit capabilities.” The companies said they expect the multi-orbit solution to be in service by 2024. Inflight connectivity is certainly an […]
  • Black Hat 2022: Adapting to the growing cyberthreat landscape
    The nation’s first cybersecurity chief is warning that the growing threat landscape will get worse as society and businesses become more digitized. At the Black Hat USA 2022 conference, Chris Krebs, the first director of the U.S. Cybersecurity and Infrastructure Security Agency, said he spent the last 18 months gathering information. He spoke to people […]
  • Diffusing the connected car's ticking data-privacy timebomb
    Connected and autonomous vehicles (CAVs) collate a significant amount of data to ensure vehicle safety, requiring an always-on internet connection and hundreds of sensors. An entire industry has been developed around monitoring, logging, analyzing and monetizing it. Yet, the danger is, particularly with increasing cyber-attacks, that this data could end up being leaked and stolen. […]
  • Patch madness: Vendor bug advisories are broken, so broken
    BLACK HAT USA – Las Vegas – Keeping up with security-vulnerability patching is challenging at best, but prioritizing which bugs to focus on has become more difficult than ever before, thanks to context-lacking CVSS scores, muddy vendor advisories, and incomplete fixes that leave admins with a false sense of security. That’s the argument that Brian […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • 911 dispatch centers can take multiple steps to combat cyberattacks
    Newscan: Feds recover millions from pipeline ransom hackers, hint at U.S. Internet tactic
  • Cyber is the new Cold War, and AI is the arms race
  • Microsoft patches 6 zero-day vulnerabilities under active attack
  • IoT connectivity spending climbs as COVID-19 cases decline

Commentary


LTE and liability: Why the fire service must move forward with digital incident command

  • 2
6th May 2022

Partnership and collaboration must be the foundation for emergency communications

18th April 2022

FirstNet success means no hypothetical ‘shots’ need to be fired, Swenson says

22nd February 2022
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Intelsat, OneWeb team on in-flight connectivity dlvr.it/SWgYb2

15th August 2022
UrgentComm

Black Hat 2022: Adapting to the growing cyberthreat landscape dlvr.it/SWgF3Y

15th August 2022
UrgentComm

Diffusing the connected car’s ticking data-privacy timebomb dlvr.it/SWdCw2

14th August 2022
UrgentComm

Patch madness: Vendor bug advisories are broken, so broken dlvr.it/SWcvFR

14th August 2022
UrgentComm

What the 6 GHz band might mean to fixed-wireless access dlvr.it/SWctfk

14th August 2022
UrgentComm

FirstNet PTT technical progress highlighted by AT&T at APCO 2022 dlvr.it/SWZtNJ

13th August 2022
UrgentComm

Newscan: D.C. appeals court upholds FCC decision to share 5.9 GHz V2V spectrum with Wi-Fi dlvr.it/SWZQpx

13th August 2022
UrgentComm

Cisco confirms data breach, hacked files leaked dlvr.it/SWV8l9

12th August 2022

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X