Posts by Veridify Security

Cyberattacks on K-12 Schools and Higher Education

K-12 schools and universities are increasingly becoming targets for cyberattacks due to the valuable information they hold, such as student and staff personal data, financial information, and research data. Cyberattack statistics include: Proofpoint found that 90% of higher education institutions experienced at least one successful phishing attack in 2019. Malwarebytes found that the education sector…

Read More

The Importance of Protecting Smart Building Technology from Cyber Threats

Smart Building Technology Market Size Juniper Research estimates more than 115 million buildings will deploy smart building technologies by 2026, an increase of over 2.5X from 2022. Grandview Research (graph) and Fortune Business Insights both predict CAGR of over 20% through 2030 for the smart building market. Smart building technology has revolutionized the way buildings…

Read More

How Malware Can Impact OT Networks

Malware Impact on OT Networks Malware, or malicious software, can have a serious impact on operational technology (OT) networks, which are used to control and monitor industrial processes. Some ways in which malware can impact OT networks include: Disrupting operations: Malware can disrupt the normal functioning of OT systems, causing production downtime, equipment damage, and…

Read More

Differences between Zero Trust, Network Segmentation, and Microsegmentation for OT Cybersecurity

Zero Trust, Network Segmentation, and Microsegmentation important OT cybersecurity strategies, but they have different goals and approach to security. This post will discuss how these approaches are used and how they are different. ZERO TRUST Zero trust is a security model that assumes that all network traffic, whether it originates from inside or outside the…

Read More

AHR Expo 2023 Event Preview

Veridify Security will be exhibiting at the AHR Expo 2023 in booth C5455. Our demo shown below is ready to be boxed up and shipped to Atlanta! Verdify will be exhibiting a live demo of DOME™, a building automation cybersecurity platform that protects both new and existing building automation devices.  The newly revised demo platform…

Read More

Benefits of Zero Trust for OT Cybersecurity

Operational technology (OT) refers to the hardware and software systems that are used to control and monitor physical devices, processes, and events in an organization. These systems are critical to the functioning of many industries, including manufacturing, energy, transportation, and utilities. In recent years, there has been an increased focus on securing OT systems due…

Read More

Demystifying OT and IoT Security and FPGAs

OT and IoT Security and FPGAs Connecting IT and OT networks delivers greater visibility and makes it possible to better utilize platforms, buildings, industrial PLCs, and more. But it also increases complexity and blurs network boundaries—resulting in vulnerabilities that provide hackers with ample opportunities to strike. In this podcast, we review how organizations deploy Field…

Read More

Mitigating Cyber Risks in Operational Technology, Buildings, and Critical Infrastructure

Mitigating Cyber Risks in Operational Technology, Buildings, and Critical Infrastructure Operational technology (OT), buildings, and critical infrastructure are becoming smarter and more efficient with connected systems, controls, sensors, and more. With connected OT and IT systems, cybersecurity risks increase as vulnerabilities become more widely exposed. Cyberattacks bring financial, operational, and intellectual property risks, and studies…

Read More

Why you need device-level endpoint protection for improving OT security

Challenges in transferring IT security methods to protect OT devices leave commercial and industrial facilities open to attacks. These attacks can disrupt building or process operations, create safety issues, and result in data theft or ransomware. OT devices in industry 4.0 applications in manufacturing facilities and chemical processing plants are vulnerable to attacks that break…

Read More

Protecting Buildings from Cyber Attacks – 6 Steps You Can Take Today

Protecting Smart Buildings from Cyber Attacks Protecting Smart Buildings from Cyber Attacks Buildings with internet-connected OT (operational technology) devices and networks (BACnet) are susceptible to cyber attacks. This can lead to operational disruption or open a gateway to attack the IT network resulting in data theft or ransomware. This video highlights 6 things that building…

Read More