Posts by Veridify Security

Zero Trust OT Security – Stopping Cyber Attacks on Industrial Control Systems (ICS/OT/SCADA)

Watch this webinar replay of “Zero Trust OT Security – Stopping Cyber Attacks on Industrial Control Systems (ICS /OT/SCADA)” to learn about applying zero trust security at the device level. This webinar addresses the following topics: ICS cybersecurity standards Existing ICS security approaches Zero Trust and device-level implementation Cybersecurity for existing ICS devices Zero Trust…

Read More

How to Conduct a Cybersecurity Risk Assessment for Smart Buildings

As smart buildings are becoming increasingly prevalent, the integration of advanced technologies into the infrastructure of these structures introduces a myriad of cybersecurity risks. Conducting a comprehensive cybersecurity risk assessment is imperative to identify potential threats, vulnerabilities, and safeguard the integrity of smart building systems. This blog post will explore key steps and considerations involved…

Read More

Cybersecurity Awareness Month 2023

  October is Cybersecurity Awareness Month 2023 Cybersecurity Awareness Month 2023 is a collaboration between government and private industry to raise awareness about digital security and empower everyone to protect their personal data from digital forms of crime. The Cybersecurity and Infrastructure Agency (CISA) and the National Cybersecurity Alliance partner to create resources and communications…

Read More

Share of Worldwide Cyber Attacks by Type 2022

October is Cybersecurity Awareness Month. While Veridify specializes in cybersecurity for Building Automation, Industrial Controls Systems (ICS/.SCADA), and Critical Infrastructure, we also share in raising awareness for everyone to improve their cybersecurity posture. As the data below indicates, the most prevalent form of cyber crime in 2022 was from phishing attacks. We all see this…

Read More

Building Automation Systems, Smart Buildings, and 5 Ways to Make Them Cyber Secure

Watch this webinar replay of “Building Automation Systems, Smart Buildings, and 5 Ways to Make Them Cyber Secure” to learn about cybersecurity for buildings. Buildings are becoming more connected and more at risk to cyberattacks. This webinar will address the following items: • Connected building trends • Building controls advancements and operating efficiencies • Connected…

Read More

Zero Trust – A Virtual Air Gap for OT Security

Air-gapping computer and operational technology (OT) networks is a long-established method of protecting sensitive information and reducing the risk of operational disruption. A growing trend has been to provide connectivity from these networks to the Internet for remote monitoring and control, real-time data, data analysis, predictive maintenance, improving inventory and resource management, achieving faster decision-making,…

Read More

Zero Trust for OT Security – Shields Up vs Damage Report

In the original and newer Star Trek episodes and movies, the captain would order “shields up” or “raise shields” prior to an attack to prevent damage to the USS Enterprise. The shields were some sort of force field of which the physics is never fully described. During or after an attack the captain would request…

Read More

Zero Trust for OT Security – Overcoming Legacy Device Security Gaps and Technical Debt

The proliferation of interconnected Operational Technology (OT) devices in critical infrastructure and industrial sectors has ushered in new opportunities for increased efficiency and automation. However, this digital transformation also brings forth significant cybersecurity challenges. Perimeter security is not a sufficient solution and legacy devices and systems often lack robust security measures, leaving critical infrastructure vulnerable…

Read More

Modbus Security Issues and How to Mitigate Cyber Risks

Modbus is a commonly used protocol for industrial control systems (ICS), SCADA systems, and operational technology (OT), and is used to establish communication between various devices in a network. Because Modbus-based industrial systems were deployed in isolated (air-gapped) environments, Modbus was designed for reliability, availability, and speed – not security. Therefore, the millions of Modbus…

Read More

Protecting Farms and AgTech from Cyberattacks

Agricultural control systems, used for implementing precision agriculture, and part of the overall AgTech category, are used to manage and optimize farm operations through the use of technology. These systems have become increasingly sophisticated in recent years, utilizing sensors, drones, and other connected devices to collect and analyze data on crops, soil, and weather conditions.…

Read More