Cybersecurity
Differences between Zero Trust, Network Segmentation, and Microsegmentation for OT Cybersecurity
Zero Trust, Network Segmentation, and Microsegmentation important OT cybersecurity strategies, but they have different goals and approach to security. This post will discuss how these approaches are used and how they are different. ZERO TRUST Zero trust is a security model that assumes that all network traffic, whether it originates from inside or outside the…
Read MoreAHR Expo 2023 Event Preview
Veridify Security will be exhibiting at the AHR Expo 2023 in booth C5455. Our demo shown below is ready to be boxed up and shipped to Atlanta! Verdify will be exhibiting a live demo of DOME™, a building automation cybersecurity platform that protects both new and existing building automation devices. The newly revised demo platform…
Read More77% Increase in Malware Attacks for IoT/Connected Devices in 1H22
There was an increase in malware attacks on IoT/Connected Devices of 77% in the first half of 2022, according to a recent report by Sonic Wall. The report also found that ransomware attacks were down 23%, but cryptojacking attacks were up 30%, and intrusion attempts were up by 19%. Cryptojacking uses processing power on unauthorized…
Read MoreCybersecurity in the Workplace: 4 Tips to Keep Your Business Safe and Secure
Keeping information safe and secure is a challenging development for businesses of all sizes over the last few years. Expeditious shifts from in-person to online to hybrid workplaces forced companies to change, or at least reexamine, their cybersecurity practices and protocols, and far too often they weren’t prepared. In fact, according to CyberEdge’s Cyberthreat Defense…
Read MoreAnatomy of a Data Breach
What are They and What to do When You Spot One? Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health, the last two years have…
Read MoreScaling at the Edge – Making Industrial IoT and Smart Buildings Cyber Safe
Making Industrial IoT and Smart Buildings Cyber Safe Veridify’s cybersecurity uses technology from Intel and industrial computing hardware from Advantech. Veridify and Advantech were invited by Intel to participate in Intel’s “Scaling at the Edge” video series. Please click the image or link below to watch on the Intel website. Watch Video (10 min) |…
Read MoreConcerned About Cybersecurity? 4 Easy Steps for Staying Secure
Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic, to coping with the fallout of high-profile breaches of national infrastructure such as the Colonial Pipeline, there is a…
Read More