Posts by Veridify Security
Differences between Zero Trust, Network Segmentation, and Microsegmentation for OT Cybersecurity
Zero Trust, Network Segmentation, and Microsegmentation important OT cybersecurity strategies, but they have different goals and approach to security. This post will discuss how these approaches are used and how they are different. ZERO TRUST Zero trust is a security model that assumes that all network traffic, whether it originates from inside or outside the…
Read MoreAHR Expo 2023 Event Preview
Veridify Security will be exhibiting at the AHR Expo 2023 in booth C5455. Our demo shown below is ready to be boxed up and shipped to Atlanta! Verdify will be exhibiting a live demo of DOME™, a building automation cybersecurity platform that protects both new and existing building automation devices. The newly revised demo platform…
Read MoreBenefits of Zero Trust for OT Cybersecurity
Operational technology (OT) refers to the hardware and software systems that are used to control and monitor physical devices, processes, and events in an organization. These systems are critical to the functioning of many industries, including manufacturing, energy, transportation, and utilities. In recent years, there has been an increased focus on securing OT systems due…
Read MoreDemystifying OT and IoT Security and FPGAs
OT and IoT Security and FPGAs Connecting IT and OT networks delivers greater visibility and makes it possible to better utilize platforms, buildings, industrial PLCs, and more. But it also increases complexity and blurs network boundaries—resulting in vulnerabilities that provide hackers with ample opportunities to strike. In this podcast, we review how organizations deploy Field…
Read MoreMitigating Cyber Risks in Operational Technology, Buildings, and Critical Infrastructure
Mitigating Cyber Risks in Operational Technology, Buildings, and Critical Infrastructure Operational technology (OT), buildings, and critical infrastructure are becoming smarter and more efficient with connected systems, controls, sensors, and more. With connected OT and IT systems, cybersecurity risks increase as vulnerabilities become more widely exposed. Cyberattacks bring financial, operational, and intellectual property risks, and studies…
Read MoreWhy you need device-level endpoint protection for improving OT security
Challenges in transferring IT security methods to protect OT devices leave commercial and industrial facilities open to attacks. These attacks can disrupt building or process operations, create safety issues, and result in data theft or ransomware. OT devices in industry 4.0 applications in manufacturing facilities and chemical processing plants are vulnerable to attacks that break…
Read MoreProtecting Buildings from Cyber Attacks – 6 Steps You Can Take Today
Protecting Smart Buildings from Cyber Attacks Buildings with internet-connected OT (operational technology) devices and networks (BACnet) are susceptible to cyber attacks. This can lead to operational disruption or open a gateway to attack the IT network resulting in data theft or ransomware. This video highlights 6 things that building operators and systems integrators can do…
Read More77% Increase in Malware Attacks for IoT/Connected Devices in 1H22
There was an increase in malware attacks on IoT/Connected Devices of 77% in the first half of 2022, according to a recent report by Sonic Wall. The report also found that ransomware attacks were down 23%, but cryptojacking attacks were up 30%, and intrusion attempts were up by 19%. Cryptojacking uses processing power on unauthorized…
Read MoreCybersecurity in the Workplace: 4 Tips to Keep Your Business Safe and Secure
Keeping information safe and secure is a challenging development for businesses of all sizes over the last few years. Expeditious shifts from in-person to online to hybrid workplaces forced companies to change, or at least reexamine, their cybersecurity practices and protocols, and far too often they weren’t prepared. In fact, according to CyberEdge’s Cyberthreat Defense…
Read MoreAnatomy of a Data Breach
What are They and What to do When You Spot One? Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health, the last two years have…
Read More