Cybersecurity Challenges in Retrofitted Smart Buildings
Key Points Legacy Systems Are Inherently Vulnerable: Most retrofitted buildings rely on outdated OT devices and insecure protocols (like BACnet and Modbus) that lack basic cybersecurity features such as encryption and authentication. Integration Increases Risk: Retrofitting often connects legacy OT systems to modern IT networks without proper segmentation, exposing buildings to lateral movement and cyberattacks.…
Read More Zero Trust Security for Legacy OT Devices
Key Points Legacy OT Challenges: Many older OT systems use insecure protocols, lack modern security features, and have limited hardware resources—making them difficult to protect using traditional cybersecurity methods. Zero Trust Integration Options: Three primary methods exist—device replacement (costly), software-defined networking (limited protection), and security overlays (most effective and non-intrusive), with overlays offering encryption and…
Read More Quantum-Resistant Security for IoT and M2M Devices
Key Points Quantum Threat to Existing Encryption: Quantum computers will be able to break today’s widely used encryption methods (like RSA and ECC) in minutes, making current IoT and M2M device security obsolete. IoT/M2M Vulnerabilities: These devices have long lifespans, limited ability to receive updates, and often perform critical functions—making them high-value targets for future…
Read More Securing Critical Infrastructure to Reduce OT Cyber Risks and Impacts
Webinar Summary – Securing Critical Infrastructure (OT) In the webinar about securing critical infrastructure hosted by KMC Controls, the panelists discussed critical infrastructure and the importance of hardening operational technology (OT) against cyber vulnerabilities. The session featured insights from Sandy Kline, Louis Parks, and Paris Stringfellow, who shared their extensive experience in cybersecurity and operational…
Read More Zero Trust Security for Building Management Systems in Data Centers
Key Points Cooling and Power Risks: While power failures are the top cause of serious data center outages, 13–19% result from cooling issues, with notable incidents caused by extreme heat. Cyber Threats to Environmental Systems: Attackers can overheat servers via workload manipulation, compromise HVAC controls through DCIM systems, or sabotage power systems—causing performance loss, hardware…
Read More Zero Trust vs Remote Access VPN for Building Control Systems
Zero Trust architecture fundamentally transforms how organizations secure their building automation networks by addressing the inherent vulnerabilities of traditional remote access VPN-based security. Key Points VPNs Grant Broad Access; Zero Trust Enforces Least Privilege: VPNs give authenticated users full network access, while Zero Trust limits each user or device to only the specific resources needed,…
Read More Siegeware and the Cyber Defense of Smart Buildings
Key Points Siegeware is a targeted cyber threat that exploits smart building systems (like HVAC, access control, and elevators) to extort building owners by locking them out or threatening disruption. Vulnerabilities include weak IoT security, outdated software, and poor network segmentation, all of which expand as buildings become more connected. Common reconnaissance tools like Shodan…
Read More Commercial Real Estate Cybersecurity Governance and Best Practices
Key Points Rising Cyber Risks in CRE: Digital transformation, IoT devices, and AI in smart buildings create new vulnerabilities, making cybersecurity a critical business priority for commercial real estate firms. Governance Framework Essentials: CRE companies must evaluate current protections, assess adequacy through continuous risk evaluation, and verify security performance with monitoring, third-party validation, and incident…
Read More How Zero Trust Enhances the Security of Building Control Systems
Key Points Minimizes Attack Surface: Replaces location-based trust with granular access controls, reducing the chance of a single breach spreading across interconnected BAS components. Prevents Lateral Movement: Uses micro-segmentation to isolate workloads and resources, containing threats within compromised segments. Continuous Verification & Least Privilege: Continuously authenticates and authorizes users/devices while limiting each to only the…
Read More AHR Expo 2025 Event Preview
Veridify Security will be exhibiting at the AHR Expo 2025 in Orlando at booth 1489. Verdify will be exhibiting a live demo of DOME™, a building automation cybersecurity platform that protects both new and existing building automation devices. The demo platform will showcase: DOME Sentry™ devices protecting an unprotected building thermostats and controller DOME Sentry…
Read More