{"id":55682,"date":"2020-04-01T01:01:50","date_gmt":"2020-04-01T05:01:50","guid":{"rendered":"https:\/\/www.policechiefmagazine.org\/?p=55682"},"modified":"2024-09-18T09:07:13","modified_gmt":"2024-09-18T13:07:13","slug":"tech-talk-enforcing-cybersecurity-best-practices-for-leas","status":"publish","type":"post","link":"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/","title":{"rendered":"Tech Talk: Enforcing Cybersecurity Best Practices for Law Enforcement Agencies"},"content":"protected_content","excerpt":{"rendered":"<p>Every day, more extensive and sophisticated data breaches and cybercrimes occur across the globe. Unfortunately, law enforcement has not escaped the limelight and, as a result, has become a target for cyber criminals seeking to exploit sensitive information and impact critical infrastructure.<\/p>\n<p>For local law enforcement agencies, the challenges to keep data secure can be very overwhelming. Law enforcement agencies are naturally focused on preventing crime, but the often reactive nature of responding to a data breach makes it seem like an impossible task.<\/p>\n<p>Furthermore, technology is now embedded in daily processes across police departments and emergency services\u2014with all services highly dependent on systems such as computer-aided dispatch and alert systems in order to respond to an incident and bring people and equipment to locations as quickly as possible. This technology is essential, but the intelligence embedded throughout the systems is shared primarily through the Internet, which is increasingly one of the most exposed points in the network infrastructure. So where should law enforcement agencies even begin?<\/p>\n","protected":false},"author":10551,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[152,157],"tags":[483,550,882,228],"class_list":["post-55682","post","type-post","status-publish","format-standard","hentry","category-columns","category-tech-talk","tag-cyber-attacks","tag-cybercrime","tag-cybersecurity","tag-risk-management"],"acf":{"subtitle":"","post_author":"Simon Hill, Head of Legal and Compliance, Certes Networks","main_category":"Tech Talk","legacy_article_id":"","legacy_issue_id":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.4 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tech Talk: Enforcing Cybersecurity Best Practices for Law Enforcement Agencies - Police Chief Magazine<\/title>\n<meta name=\"description\" content=\"There are three key things that law enforcement agencies can do to minimize risks and enforce best cybersecurity practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tech Talk: Enforcing Cybersecurity Best Practices for Law Enforcement Agencies\" \/>\n<meta property=\"og:description\" content=\"There are three key things that law enforcement agencies can do to minimize risks and enforce best cybersecurity practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/\" \/>\n<meta property=\"og:site_name\" content=\"Police Chief Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TheIACP\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-01T05:01:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-18T13:07:13+00:00\" \/>\n<meta name=\"author\" content=\"Camryn Nethken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TheIACP\" \/>\n<meta name=\"twitter:site\" content=\"@TheIACP\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camryn Nethken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/\"},\"author\":{\"name\":\"Camryn Nethken\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/ddf1f2c6a9448dfab5ba63ce69aa6569\"},\"headline\":\"Tech Talk: Enforcing Cybersecurity Best Practices for Law Enforcement Agencies\",\"datePublished\":\"2020-04-01T05:01:50+00:00\",\"dateModified\":\"2024-09-18T13:07:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/\"},\"wordCount\":1574,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/#organization\"},\"keywords\":[\"cyber attacks\",\"cybercrime\",\"cybersecurity\",\"risk management\"],\"articleSection\":[\"Columns\",\"Tech Talk\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/\",\"url\":\"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/\",\"name\":\"Tech Talk: Enforcing Cybersecurity Best Practices for Law Enforcement Agencies - Police Chief Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/#website\"},\"datePublished\":\"2020-04-01T05:01:50+00:00\",\"dateModified\":\"2024-09-18T13:07:13+00:00\",\"description\":\"There are three key things that law enforcement agencies can do to minimize risks and enforce best cybersecurity practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.policechiefmagazine.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tech Talk: Enforcing Cybersecurity Best Practices for Law Enforcement Agencies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#website\",\"url\":\"https:\/\/www.policechiefmagazine.org\/\",\"name\":\"Police Chief Magazine\",\"description\":\"Police Chief Magazine\",\"publisher\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.policechiefmagazine.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#organization\",\"name\":\"Police Chief Magazine\",\"url\":\"https:\/\/www.policechiefmagazine.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/logo-name-blue.png\",\"contentUrl\":\"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/logo-name-blue.png\",\"width\":500,\"height\":246,\"caption\":\"Police Chief Magazine\"},\"image\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TheIACP\",\"https:\/\/x.com\/TheIACP\",\"https:\/\/www.instagram.com\/theiacp\/\",\"https:\/\/www.linkedin.com\/company\/international-association-of-chiefs-of-police\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/ddf1f2c6a9448dfab5ba63ce69aa6569\",\"name\":\"Camryn Nethken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3ae6b7359d33d94605597abba63b7b7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3ae6b7359d33d94605597abba63b7b7?s=96&d=mm&r=g\",\"caption\":\"Camryn Nethken\"},\"url\":\"https:\/\/www.policechiefmagazine.org\/author\/cnethken\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tech Talk: Enforcing Cybersecurity Best Practices for Law Enforcement Agencies - Police Chief Magazine","description":"There are three key things that law enforcement agencies can do to minimize risks and enforce best cybersecurity practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/","og_locale":"en_US","og_type":"article","og_title":"Tech Talk: Enforcing Cybersecurity Best Practices for Law Enforcement Agencies","og_description":"There are three key things that law enforcement agencies can do to minimize risks and enforce best cybersecurity practices.","og_url":"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/","og_site_name":"Police Chief Magazine","article_publisher":"https:\/\/www.facebook.com\/TheIACP","article_published_time":"2020-04-01T05:01:50+00:00","article_modified_time":"2024-09-18T13:07:13+00:00","author":"Camryn Nethken","twitter_card":"summary_large_image","twitter_creator":"@TheIACP","twitter_site":"@TheIACP","twitter_misc":{"Written by":"Camryn Nethken","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/#article","isPartOf":{"@id":"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/"},"author":{"name":"Camryn Nethken","@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/ddf1f2c6a9448dfab5ba63ce69aa6569"},"headline":"Tech Talk: Enforcing Cybersecurity Best Practices for Law Enforcement Agencies","datePublished":"2020-04-01T05:01:50+00:00","dateModified":"2024-09-18T13:07:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/"},"wordCount":1574,"commentCount":0,"publisher":{"@id":"https:\/\/www.policechiefmagazine.org\/#organization"},"keywords":["cyber attacks","cybercrime","cybersecurity","risk management"],"articleSection":["Columns","Tech Talk"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/","url":"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/","name":"Tech Talk: Enforcing Cybersecurity Best Practices for Law Enforcement Agencies - Police Chief Magazine","isPartOf":{"@id":"https:\/\/www.policechiefmagazine.org\/#website"},"datePublished":"2020-04-01T05:01:50+00:00","dateModified":"2024-09-18T13:07:13+00:00","description":"There are three key things that law enforcement agencies can do to minimize risks and enforce best cybersecurity practices.","breadcrumb":{"@id":"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.policechiefmagazine.org\/tech-talk-enforcing-cybersecurity-best-practices-for-leas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.policechiefmagazine.org\/"},{"@type":"ListItem","position":2,"name":"Tech Talk: Enforcing Cybersecurity Best Practices for Law Enforcement Agencies"}]},{"@type":"WebSite","@id":"https:\/\/www.policechiefmagazine.org\/#website","url":"https:\/\/www.policechiefmagazine.org\/","name":"Police Chief Magazine","description":"Police Chief Magazine","publisher":{"@id":"https:\/\/www.policechiefmagazine.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.policechiefmagazine.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.policechiefmagazine.org\/#organization","name":"Police Chief Magazine","url":"https:\/\/www.policechiefmagazine.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/logo-name-blue.png","contentUrl":"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/logo-name-blue.png","width":500,"height":246,"caption":"Police Chief Magazine"},"image":{"@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TheIACP","https:\/\/x.com\/TheIACP","https:\/\/www.instagram.com\/theiacp\/","https:\/\/www.linkedin.com\/company\/international-association-of-chiefs-of-police\/"]},{"@type":"Person","@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/ddf1f2c6a9448dfab5ba63ce69aa6569","name":"Camryn Nethken","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3ae6b7359d33d94605597abba63b7b7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3ae6b7359d33d94605597abba63b7b7?s=96&d=mm&r=g","caption":"Camryn Nethken"},"url":"https:\/\/www.policechiefmagazine.org\/author\/cnethken\/"}]}},"category_objects":[{"term_id":152,"name":"Columns","slug":"columns","term_group":0,"term_taxonomy_id":152,"taxonomy":"category","description":"","parent":0,"count":1401,"filter":"raw"},{"term_id":157,"name":"Tech Talk","slug":"tech-talk","term_group":0,"term_taxonomy_id":157,"taxonomy":"category","description":"","parent":152,"count":183,"filter":"raw"}],"thumbnail_url":"","_links":{"self":[{"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/posts\/55682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/users\/10551"}],"replies":[{"embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/comments?post=55682"}],"version-history":[{"count":4,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/posts\/55682\/revisions"}],"predecessor-version":[{"id":79913,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/posts\/55682\/revisions\/79913"}],"wp:attachment":[{"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/media?parent=55682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/categories?post=55682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/tags?post=55682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}