{"id":1012,"date":"2024-09-09T08:22:09","date_gmt":"2024-09-09T13:22:09","guid":{"rendered":"http:\/\/ause1wordpress01.aws.mot-solutions.com\/en_us\/?p=1012"},"modified":"2024-10-08T12:01:52","modified_gmt":"2024-10-08T17:01:52","slug":"insights-from-a-live-hacking-demonstration-why-security-patching-is-critical","status":"publish","type":"post","link":"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/","title":{"rendered":"Insights from a Live Hacking Demonstration &#8211; Why Security Patching is Critical"},"content":{"rendered":"<p>I recently attended IWCE, a conference focused on e<img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"167\" class=\"size-medium wp-image-1017 alignright\" src=\"\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/Services_116_-1168-250x167.jpg\" alt=\"Services_116_-1168\" srcset=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/Services_116_-1168-250x167.jpg 250w, https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/Services_116_-1168-768x512.jpg 768w, https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/Services_116_-1168-700x466.jpg 700w, https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/Services_116_-1168-120x80.jpg 120w, https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/Services_116_-1168.jpg 800w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/>ducating end-users and operators on the trends and evolving technologies taking place with Land Mobile Radio (LMR) systems. My mission at the show was to increase cybersecurity awareness. <a href=\"https:\/\/www.motorolasolutions.com\/en_us\/communities\/fresh-ideas.entry.html\/2015\/10\/20\/is_lmr_still_a_close-MYBu.html\" target=\"_blank\" rel=\"noopener\">LMR systems are no longer entirely closed networks or immune from cyber threats<\/a>. If anything, serving as a mission-critical, communication component for government and public safety agencies, they have a propensity of gaining the attention of hackers.<a href=\"http:\/\/t.na.motorolasolutions.com\/webApp\/APP4336_Cybersecurity_Whitepaper?_ga=1.156138047.561832669.1492437335\" target=\"_blank\" rel=\"noopener\"> Government entities are being attacked at twice the rate of other industries across the board<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>My goal was to raise awareness about the importance of proactive cybersecurity measures for LMR systems with a live hacking demonstration. From my demos, here were the common insights I gleaned from the LMR end-users and system operators I met:<\/p>\n<p>&nbsp;<\/p>\n<p>Cybersecurity education is still needed. Only a small subset of those I spoke to had a sound understanding of their LMR system\u2019s level of risk. Others were aware that their systems are now vulnerable to cyber threats. However, they were not knowledgeable of how their system can be compromised; their risk posture; or how to protect their systems from and respond to cyber intrusions.<\/p>\n<p>&nbsp;<\/p>\n<p>Hackers aren\u2019t that sophisticated. Most of the individuals I spoke to weren\u2019t aware that you don\u2019t have to be a brilliant hacker to create something that can comprise a system. Without a great deal of knowledge, hackers can create an exploit that can work on a LMR system. Everything needed is available through a few clicks of the button. A conference attendee that person I spoke to said, \u201cI had no idea it was that simple!\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>Chaos and disruption is the end goal. During my demo, I reviewed various examples of the actions hackers can take once in their systems. I explained how a hacker can upload code to overwrite operating software files to disrupt the network, launch web browser that redirect system users to a malicious website, and execute commands that can remotely shutdown and reboot a system server. Most system assaults are directed at disrupting communication at some level.<\/p>\n<p>&nbsp;<\/p>\n<p>Most successful attacks are based on known vulnerabilities. The \u201cA Ha!!\u201d moment came when I pointed out that<a href=\"https:\/\/www.motorolasolutions.com\/en_us\/communities\/fresh-ideas.entry.html\/2015\/07\/24\/to_patch_or_not_top-ptxW.html\" target=\"_blank\" rel=\"noopener\"> most attacks are based on known system vulnerabilities<\/a> \u2013 75% according to the Center for Strategic and International Studies. However, the good news is that these vulnerabilities have patches that can be applied to systems. Security patching is one of the first and important steps anyone can take to mitigate cybersecurity threats.<\/p>\n<p>&nbsp;<\/p>\n<p>From my conversations at the show, the LMR end-users and operators I spoke to are more aware that their systems are vulnerable to cyber intrusions. However, it\u2019s important that everyone understands their system\u2019s risk posture and how to proactively address cyber threats. There isn\u2019t room for complacency when safeguarding a mission-critical, LMR system. While there are many strategies and options available, there is one action everyone should take to mitigate cyber threats\u2014<a href=\"https:\/\/www.motorolasolutions.com\/content\/dam\/msi\/docs\/services\/security\/security-update-service\/motorola_solutions_security_update_service_datasheet.pdf\" target=\"_blank\" rel=\"noopener\">regular security patching<\/a>. For our customers, we offer this service with rigor by pre-testing and validating all required patches to ensure they don\u2019t cause any disruption when installed. If you don\u2019t patch, you\u2019re at greater risk to get hacked. Why let that happen? Learn more at <a href=\"http:\/\/www.motorolasolutions.com\/map\/en_us\/cybersecurity#tabserviceinfo\" target=\"_blank\" rel=\"noopener\">motorolasolutions.com\/cybersecurity<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"I recently attended IWCE, a conference focused on educating end-users and operators on the trends and evolving technologies taking place with Land Mobile Radio (LMR) systems. My mission at the show was to increase cybersecurity awareness. LMR systems are no longer entirely closed networks or immune from cyber threats. If anything, serving as a mission-critical,&#8230; <a class=\"btn-featured test\" href=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/\" data-uet=\"{&#39;event_category&#39;:&#39;blog featured post interaction&#39;,&#39;event_action&#39;:&#39;blog read more button click&#39;,&#39;event_label&#39;:&#39;Insights from a Live Hacking Demonstration &#8211; Why Security Patching is Critical&#39;,&#39;event_page_area&#39;:&#39;body&#39;,&#39;restriction_status&#39;:&#39;public&#39;,&#39;link_text&#39;:&#39;Insights from a Live Hacking Demonstration &#8211; Why Security Patching is Critical&#39;,&#39;link_url&#39;:&#39;https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/&#39;,&#39;tealium_event&#39;:&#39;link_click&#39;,&#39;page_type&#39;:&#39;&#39;}\" >Read More<\/a>","protected":false},"author":12,"featured_media":1018,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,3,8],"tags":[],"class_list":["post-1012","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-law-enforcement","category-energy-industries","category-fire-and-emergency-medical-services"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Insights from a Live Hacking Demonstration - Why Security Patching is Critical - Motorola Solutions Blog<\/title>\n<meta name=\"description\" content=\"Read the article Insights from a Live Hacking Demonstration - Why Security Patching is Critical and learn more about our solutions and services.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insights from a Live Hacking Demonstration - Why Security Patching is Critical - Motorola Solutions Blog\" \/>\n<meta property=\"og:description\" content=\"Read the article Insights from a Live Hacking Demonstration - Why Security Patching is Critical and learn more about our solutions and services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/\" \/>\n<meta property=\"og:site_name\" content=\"Motorola Solutions Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MotorolaSolutions\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-09T13:22:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-08T17:01:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/INSIGHTS-FROM-A-LIVE-HACKING-DEMONSTRATION-WHY-SECURITY-PATCHING-IS-CRITICAL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@motosolutions\" \/>\n<meta name=\"twitter:site\" content=\"@motosolutions\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/\",\"name\":\"Insights from a Live Hacking Demonstration - Why Security Patching is Critical - Motorola Solutions Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/INSIGHTS-FROM-A-LIVE-HACKING-DEMONSTRATION-WHY-SECURITY-PATCHING-IS-CRITICAL.jpg\",\"datePublished\":\"2024-09-09T13:22:09+00:00\",\"dateModified\":\"2024-10-08T17:01:52+00:00\",\"author\":{\"@id\":\"\"},\"description\":\"Read the article Insights from a Live Hacking Demonstration - Why Security Patching is Critical and learn more about our solutions and services.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/#primaryimage\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/INSIGHTS-FROM-A-LIVE-HACKING-DEMONSTRATION-WHY-SECURITY-PATCHING-IS-CRITICAL.jpg\",\"contentUrl\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/INSIGHTS-FROM-A-LIVE-HACKING-DEMONSTRATION-WHY-SECURITY-PATCHING-IS-CRITICAL.jpg\",\"width\":800,\"height\":533,\"caption\":\"INSIGHTS FROM A LIVE HACKING DEMONSTRATION - WHY SECURITY PATCHING IS CRITICAL\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights from a Live Hacking Demonstration &#8211; Why Security Patching is Critical\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/\",\"name\":\"Motorola Solutions Blog\",\"description\":\"Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insights from a Live Hacking Demonstration - Why Security Patching is Critical - Motorola Solutions Blog","description":"Read the article Insights from a Live Hacking Demonstration - Why Security Patching is Critical and learn more about our solutions and services.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Insights from a Live Hacking Demonstration - Why Security Patching is Critical - Motorola Solutions Blog","og_description":"Read the article Insights from a Live Hacking Demonstration - Why Security Patching is Critical and learn more about our solutions and services.","og_url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/","og_site_name":"Motorola Solutions Blog","article_publisher":"https:\/\/www.facebook.com\/MotorolaSolutions","article_published_time":"2024-09-09T13:22:09+00:00","article_modified_time":"2024-10-08T17:01:52+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/INSIGHTS-FROM-A-LIVE-HACKING-DEMONSTRATION-WHY-SECURITY-PATCHING-IS-CRITICAL.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@motosolutions","twitter_site":"@motosolutions","twitter_misc":{"Written by":"","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/","name":"Insights from a Live Hacking Demonstration - Why Security Patching is Critical - Motorola Solutions Blog","isPartOf":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/#primaryimage"},"image":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/#primaryimage"},"thumbnailUrl":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/INSIGHTS-FROM-A-LIVE-HACKING-DEMONSTRATION-WHY-SECURITY-PATCHING-IS-CRITICAL.jpg","datePublished":"2024-09-09T13:22:09+00:00","dateModified":"2024-10-08T17:01:52+00:00","author":{"@id":""},"description":"Read the article Insights from a Live Hacking Demonstration - Why Security Patching is Critical and learn more about our solutions and services.","breadcrumb":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/#primaryimage","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/INSIGHTS-FROM-A-LIVE-HACKING-DEMONSTRATION-WHY-SECURITY-PATCHING-IS-CRITICAL.jpg","contentUrl":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/INSIGHTS-FROM-A-LIVE-HACKING-DEMONSTRATION-WHY-SECURITY-PATCHING-IS-CRITICAL.jpg","width":800,"height":533,"caption":"INSIGHTS FROM A LIVE HACKING DEMONSTRATION - WHY SECURITY PATCHING IS CRITICAL"},{"@type":"BreadcrumbList","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/insights-from-a-live-hacking-demonstration-why-security-patching-is-critical\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog-test.motorolasolutions.com\/en_us\/"},{"@type":"ListItem","position":2,"name":"Insights from a Live Hacking Demonstration &#8211; Why Security Patching is Critical"}]},{"@type":"WebSite","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/","name":"Motorola Solutions Blog","description":"Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog-test.motorolasolutions.com\/en_us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/1012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/comments?post=1012"}],"version-history":[{"count":1,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/1012\/revisions"}],"predecessor-version":[{"id":2256,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/1012\/revisions\/2256"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/media\/1018"}],"wp:attachment":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/media?parent=1012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/categories?post=1012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/tags?post=1012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}