Cybersecurity
Share of Worldwide Cyber Attacks by Type 2022
October is Cybersecurity Awareness Month. While Veridify specializes in cybersecurity for Building Automation, Industrial Controls Systems (ICS/.SCADA), and Critical Infrastructure, we also share in raising awareness for everyone to improve their cybersecurity posture. As the data below indicates, the most prevalent form of cyber crime in 2022 was from phishing attacks. We all see this…
Read MoreBuilding Automation Systems, Smart Buildings, and 5 Ways to Make Them Cyber Secure
Watch this webinar replay of “Building Automation Systems, Smart Buildings, and 5 Ways to Make Them Cyber Secure” to learn about cybersecurity for buildings. Buildings are becoming more connected and more at risk to cyberattacks. This webinar will address the following items: • Connected building trends • Building controls advancements and operating efficiencies • Connected…
Read MoreZero Trust – A Virtual Air Gap for OT Security
Air-gapping computer and operational technology networks is a long-established method of protecting sensitive information and reducing the risk of operational disruption. A growing trend has been to provide connectivity from these networks to the Internet for remote monitoring and control, real-time data, data analysis, predictive maintenance, improving inventory and resource management, achieving faster decision-making, and…
Read MoreZero Trust for OT Security – Shields Up vs Damage Report
In the original and newer Star Trek episodes and movies, the captain would order “shields up” or “raise shields” prior to an attack to prevent damage to the USS Enterprise. The shields were some sort of force field of which the physics is never fully described. During or after an attack the captain would request…
Read MoreZero Trust for OT Security – Overcoming Legacy Device Security Gaps and Technical Debt
The proliferation of interconnected Operational Technology (OT) devices in critical infrastructure and industrial sectors has ushered in new opportunities for increased efficiency and automation. However, this digital transformation also brings forth significant cybersecurity challenges. Perimeter security is not a sufficient solution and legacy devices and systems often lack robust security measures, leaving critical infrastructure vulnerable…
Read MoreModbus Security Issues and How to Mitigate Cyber Risks
Modbus is a commonly used protocol for industrial control systems (ICS), SCADA systems, and operational technology (OT), and is used to establish communication between various devices in a network. Because Modbus-based industrial systems were deployed in isolated (air-gapped) environments, Modbus was designed for reliability, availability, and speed – not security. Therefore, the millions of Modbus…
Read MoreCybersecurity threats to hospitals and healthcare facility building management systems
A recent cyberattack forced a healthcare organization to cancel non-emergency surgeries and send some emergency patients to other facilities. In another attack, a hospital took it’s critical systems offline, impacting patient safety, requiring less efficient care methods, which also increased labor demands. It’s still impacted two years later. Cyberattacks on hospital and healthcare facilities increased…
Read MoreDifferences between Zero Trust, Network Segmentation, and Microsegmentation for OT Cybersecurity
Zero Trust, Network Segmentation, and Microsegmentation important OT cybersecurity strategies, but they have different goals and approach to security. This post will discuss how these approaches are used and how they are different. ZERO TRUST Zero trust is a security model that assumes that all network traffic, whether it originates from inside or outside the…
Read MoreAHR Expo 2023 Event Preview
Veridify Security will be exhibiting at the AHR Expo 2023 in booth C5455. Our demo shown below is ready to be boxed up and shipped to Atlanta! Verdify will be exhibiting a live demo of DOME™, a building automation cybersecurity platform that protects both new and existing building automation devices. The newly revised demo platform…
Read More77% Increase in Malware Attacks for IoT/Connected Devices in 1H22
There was an increase in malware attacks on IoT/Connected Devices of 77% in the first half of 2022, according to a recent report by Sonic Wall. The report also found that ransomware attacks were down 23%, but cryptojacking attacks were up 30%, and intrusion attempts were up by 19%. Cryptojacking uses processing power on unauthorized…
Read More