Cybersecurity Threat Landscape
Cyber threats continue to grow in scale and complexity. With a 17 percent rise in attacks on public safety organizations globally in 2025, it is no longer a matter of if, but when a cyber attack occurs. When it comes to detecting and preventing cyber threats, information is critical. Discover the main threat points and how Motorola Solutions cybersecurity services can help.
Begin your journey
Prevent and detect cyber threats in your environment
It is no longer a matter of if, but when, a cyber attack occurs. From large to small environments, cyber criminals are taking advantage. These attacks can lead to disruptions in critical systems, causing downtime and loss of data. Explore each cyber threat point below to learn how threat actors attack, what the outcome is and how cyber solutions can help.
Police Station
Fire Station
Police Dispatch
Town Hall
Hospital
NOC
PSAP
See outcome
Previous
Outcome
The attack is blocked and there is no impact on ongoing criminal investigations or court cases.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
Download Whitepaper
Demo request
Close
Close
Previous
Outcome
The cyber attackers are prevented from exploiting the Remote Desktop Protocols (RDP) and the emergency medical services dispatch system remains fully operational.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
Download Whitepaper
Demo request
Close
Challenge
Lost or disoriented individual
Locating lost children or missing persons in crowded areas can be challenging due to the unpredictability of their movements and the high volume of other passengers at the airport. Prompt identification and assistance is essential to prevent escalations and ensure their safety.
Solution
Face match to recognise missing person and activate appearance tracking
AI-powered video analytics scrutinises hours of video footage, enabling rapid location of specific persons of interest matching a defined physical description or uploaded photo. If known, photo of missing child can be uploaded, with facial recognition allowing creation of alerts to notify nearby security staff.
Previous
Outcome
Notification communicated, first response initiated
Situational awareness maintained, local police directly informed with missing person video for immediate response and incident recorded and logged.
Our technologies helps airports protect all areas, detect anomalies, keep the right people in the right place and connect all their complex operations with clear communications.
Download solution ebook
Demo request
Close
Previous
Outcome
The impact of the brute force attack was limited to non-essential systems and the fire brigade could continue its public safety operations, putting out fires and saving lives.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
Download Whitepaper
Demo request
Close
Previous
Outcome
The cyber criminals are prevented from gaining access to the CAD system using stolen credentials and the dispatchers can continue to respond to emergencies without any disruption, keeping the local community safe.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
Download Whitepaper
Demo request
Close
Previous
Outcome
The town’s mission critical systems and constituent data were protected from the Phishing attack malware and the impact of the attack was limited to non-essential systems. Emergency calls were answered and first responders continued to be dispatched, keeping the townspeople safe.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
Download Whitepaper
Demo request
Close
PSAP Attack
Ground handlers' safety - an ongoing concern
Attackers gain access to the 911 emergency call handling system using compromised VPN credentials. Accessing the IT network they deploy ransomware across the connected systems, encrypting files and disrupting operations
Solution
AI-Trained noise suppression
Managed Detection & Response (MDR) service detects threat actors and lateral movement on the network, preventing data exfiltration or system downtime.
Endpoint Detection and Response (EDR) software blocks malware from executing and isolates infected systems
Previous
Outcome
The firewall vulnerability is fixed before cyber attackers can use it to gain access to the PSAP’s system and the emergency call handlers can continue to answer and respond to emergency calls without disruption and without the PSAP having to pay any ransom demands.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
Download Whitepaper
Demo request
Close
Previous
Outcome
The cyber attackers are stopped from bringing down the radio communications system with ransomware and the point of entry is closed to any future attackers. The county IT team and the SOC analysts worked together to implement a fast and effective response.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
Download Whitepaper
Demo request
Close
MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are the property of their respective owners.
* IATA - Global Air Travel Demand Continued Its Bounce Back in 2023
* Civil aviation: a climate-proof rebound? - Futuribles
Contact sales
Click on each icon to explore
See outcome
see outcome
See outcome
See outcome
See outcome
see outcome
See outcome
Download whitepaper
Impact
The system 911 emergency call handling system is down for 3 days, whilst the IT systems are rebuilt. They cannot handle emergency calls which have to be redirected to a neighboring county.
Threat
Ground handlers' safety - an ongoing concern
Firewall Vulnerability—Threat actors exploit a critical vulnerability on an external facing firewall to gain access to the Public Safety Answering Point’s (PSAP’s) systems.
Challenge
Emergency call handling system down—The threat actors gain access to the admin system, stealing confidential data and deploying ransomware and demanding payment to restore the mission critical systems. The emergency call handling system is down for 5 days whilst engineers rebuild the system, meaning all emergency calls have to be redirected to a neighboring county.
Solution
AI-Trained noise suppression
Managed Detection and Response Service—Regular External Vulnerability Scans (EVS) detects the firewall vulnerability and it is patched before attackers can exploit the vulnerability.
Security Update Services (SUS)—Our Security Update Service (SUS) makes sure the latest security patches and fixes are regularly applied, preventing the vulnerability in the firewall.
See outcome
Threat
Ground handlers' safety - an ongoing concern
Exposed VPN—Cyber attackers gain access to a county’s Customer Enterprise Network (CEN) though an exposed Virtual Private Network.
Challenge
Radio communications crippled—Cyber attackers move laterally through the county's CEN, accessing core servers for the county’s radio network, and deploying ransomware, bringing the servers down and crippling public safety radio communications for all emergency services.
Public safety radio communications are lost for 3 weeks—New servers are installed and the core is rebuilt. County emergency services are forced to use cell phones for emergency communications, delaying their response and putting lives at risk.
Solution
AI-Trained noise suppression
Managed Detection and Response Service—The Endpoint Detection and Response (EDR) software detects the ransomware and allows the analysts in the SOC (Security Operations Center) to isolate the servers, stopping the attack. The logs collected by the ActiveEye Remote Security Sensors (AERSS) and the analytic capabilities of the ActiveEye platform identify the exposed VPN, which is closed by the IT team, preventing further attacks.
Incident Response Plan—An incident response plan created with the help of our cybersecurity professional services team meant the county had a plan in place to execute a rapid response to the attack and restore radio communications as quickly as possible.
Threat
Ground handlers' safety - an ongoing concern
Phishing attack—A phishing email sent by threat actors to all staff at the town hall is accidentally opened by the Mayor installing malware on the municipalities Customer Enterprise Network (CEN).
Challenge
Public safety systems disabled—The malware installed on the town's IT systems by the phishing attack allows the threat actors to steal all of the stored Personal Identifiable Information (PII) and municipal data and send a ransom demand. During the two-week recovery period it takes to rebuild the systems and restore the lost data all municipal services are disabled including public safety and mission critical systems.
Solution
AI-Trained noise suppression
Threat
Ground handlers' safety - an ongoing concern
Compromised credentials—Cyber criminals purchase lost or stolen credentials with full access to IT systems for a local police department on the Dark Web.
Challenge
CAD system disabled—Stolen credentials give the cyber criminals full access to a local police department's IT systems. The cyber criminals move laterally through the Customer Enterprise Network (CEN) deploying ransomware on the Computer Aided Dispatch (CAD) system’s servers, locking the system and sending a ransom demand to the police department. The impacted servers have to be removed and replaced leading to the CAD system being out of operation for a month. The dispatchers have to resort to pen and paper.
Solution
AI-Trained noise suppression
Managed Detection and Response Service—The ActiveEye Remote Security Sensors (AERSS) physically deployed in the IT systems act as a Network Intrusion Detection System (NIDS) detecting threat actors lateral movement across the network. The analysts in the SOC (Security Operations Center) utilize the Endpoint Detection and Response (EDR) software to block the ransomware protecting the mission critical systems.
Penetration testing or Pentesting—Penetration testing or Pentesting by cybersecurity experts identifies the outdated security patches, insecure protocols, and inadequate user access controls that people use to access all IT systems, and recommends implementation of multifactor authentication and restricted access to mission critical systems preventing cyber criminals using stolen credentials to gain access.
Threat
Ground handlers' safety - an ongoing concern
Remote services exploitation—A cyber attacker exploits the insecure remote desktop protocols (RDP) used by hospital staff to remotely access the Emergency Medical Services (CAD) system.
Challenge
The cyber attacker uses the access gained to the CAD system to deploy ransomware, encrypting the system and rendering it inoperable for 2 weeks whilst it is rebuilt. Ambulance services, including emergency response and patient transport coordination are severely disrupted.
Solution
AI-Trained noise suppression
Managed Detection and Response Service—Regular External Vulnerability Scanning (EVS) detects the open RDP ports on firewalls allowing them to be closed before they are exploited, preventing the attack.
Penetration testing— A cybersecurity expert from our professional services team identifies the misconfigurations in the remote access systems, allowing easy logical access to the CAD system while pinpointing other vulnerabilities during a physical penetration test of the hospital.
Threat
Ground handlers' safety - an ongoing concern
Exploited public facing application—Threat actors identify a known vulnerability in an external facing Record Management Software (RMS) system, exploiting outdated patches to gain access.
Challenge
RMS system compromised—Once inside the RMS system, the threat actors steal sensitive police records, including information on ongoing criminal investigations and evidence prepared for court cases, using malware to encrypt the data in the system and send a ransom demand. The police department takes months to rebuild the RMS system, delaying ongoing court cases and impeding criminal investigations.
Solution
AI-Trained noise suppression
Managed Detection and Response Service—Endpoint Detection and Response (EDR) software detects the malicious activity, alerting the analysts in the Security Operations Center (SOC) who use the EDR software to isolate the infected systems and block the malware.
Security Update Service (SUS) —Our security update service ensures the latest security patches and fixes are regularly deployed to your systems, preventing vulnerabilities.
Threat
Ground handlers' safety - an ongoing concern
Brute Force Attack—Cyber attackers use a Brute Force attack to crack the login credentials and passwords for a fire department's IT systems, gaining access to the CAD system, where they deploy ransomware, encrypting the servers.
Challenge
Dispatch system down—The fire department forced to rely on backup manual dispatch methods for 3 weeks whilst the system is rebuilt. Sensitive location and response data for fire incidents was exposed to attackers.
Solution
AI-Trained noise suppression
Managed Detection and Response (MDR)—EDR software deployed on the CAD system detects the malware and allows cybersecurity analysts in the SOC to block the malware and isolate the infected systems.
Table Top Exercise—A Table Top Exercise led by cybersecurity experts in our professional services team identified the potential cyber threats to the fire departments systems leading the fire department to create an incident response plan and deploy a Managed Detection and Response service.
Managed Detection and Response Service—The Endpoint Detection and Response (EDR) software detects the malware and allows the cybersecurity analysts in the Security Operations Center to block the malware and isolate infected systems, meaning the public safety and mission critical systems continue to run without interruption.
Cyber risk assessments—Regular risk assessment carried out by cybersecurity experts in our professional services team identified the potential threats to the town hall’s IT systems and the interconnected mission critical system, recommending programatic changes to the town’s security program, and deployment of EDR software, supported by a Managed Detection and Response (MDR) service.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
Our services help your organization detect and respond to cyber threats and protect your mission-critical systems, maintaining their confidentiality, integrity and availability.
MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola
Trademark Holdings, LLC and are used under license. All other trademarks are the property of their respective owners.
© 2025 Motorola Solutions, Inc. All rights reserved.
Preference Center
Privacy Statement
Cookie Preferences
Talk to a cybersecurity specialist
Contact sales