Cybersecurity
Modbus Security Issues and How to Mitigate Cyber Risks
Modbus is a commonly used protocol for industrial control systems (ICS), SCADA systems, and operational technology (OT), and is used to establish communication between various devices in a network. Because Modbus-based industrial systems were deployed in isolated (air-gapped) environments, Modbus was designed for reliability, availability, and speed – not security. Therefore, the millions of Modbus…
Read MoreCybersecurity threats to hospitals and healthcare facility building management systems
A recent cyberattack forced a healthcare organization to cancel non-emergency surgeries and send some emergency patients to other facilities. In another attack, a hospital took it’s critical systems offline, impacting patient safety, requiring less efficient care methods, which also increased labor demands. It’s still impacted two years later. Cyberattacks on hospital and healthcare facilities increased…
Read MoreDifferences between Zero Trust, Network Segmentation, and Microsegmentation for OT Cybersecurity
Zero Trust, Network Segmentation, and Microsegmentation important OT cybersecurity strategies, but they have different goals and approach to security. This post will discuss how these approaches are used and how they are different. ZERO TRUST Zero trust is a security model that assumes that all network traffic, whether it originates from inside or outside the…
Read MoreAHR Expo 2023 Event Preview
Veridify Security will be exhibiting at the AHR Expo 2023 in booth C5455. Our demo shown below is ready to be boxed up and shipped to Atlanta! Verdify will be exhibiting a live demo of DOME™, a building automation cybersecurity platform that protects both new and existing building automation devices. The newly revised demo platform…
Read More77% Increase in Malware Attacks for IoT/Connected Devices in 1H22
There was an increase in malware attacks on IoT/Connected Devices of 77% in the first half of 2022, according to a recent report by Sonic Wall. The report also found that ransomware attacks were down 23%, but cryptojacking attacks were up 30%, and intrusion attempts were up by 19%. Cryptojacking uses processing power on unauthorized…
Read MoreCybersecurity in the Workplace: 4 Tips to Keep Your Business Safe and Secure
Keeping information safe and secure is a challenging development for businesses of all sizes over the last few years. Expeditious shifts from in-person to online to hybrid workplaces forced companies to change, or at least reexamine, their cybersecurity practices and protocols, and far too often they weren’t prepared. In fact, according to CyberEdge’s Cyberthreat Defense…
Read MoreAnatomy of a Data Breach
What are They and What to do When You Spot One? Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health, the last two years have…
Read MoreScaling at the Edge – Making Industrial IoT and Smart Buildings Cyber Safe
Making Industrial IoT and Smart Buildings Cyber Safe Veridify’s cybersecurity uses technology from Intel and industrial computing hardware from Advantech. Veridify and Advantech were invited by Intel to participate in Intel’s “Scaling at the Edge” video series. Watch Video (10 min) | View Slides Watch our more detailed webinar on the same topic.
Read MoreConcerned About Cybersecurity? 4 Easy Steps for Staying Secure
Cybersecurity – 4 Steps for Staying Secure Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic, to coping with the fallout of high-profile breaches of national infrastructure such…
Read MoreApplying Zero Trust to OT Networks For Smart Buildings
In December 2021, a ransomware attack locked a BAS firm and its building client out of the system, taking out 75% of smart building OT. Using device-level SaaS security in a NIST-compliant Zero Trust framework, BAS vendors can prevent smart building breaches. SaaS security for OT devices uses device-level identification and authentication, with no direct device access…
Read More