FAQs – Frequently Asked Questions | MicroAI™
page-template,page-template-full_width,page-template-full_width-php,page,page-id-28239,bridge-core-1.0.4,mega-menu-top-navigation,ajax_fade,page_not_loaded,,qode-title-hidden,qode_grid_1400,qode-content-sidebar-responsive,wpb-js-composer js-comp-ver-5.7,vc_responsive

FAQs – Frequently Asked Questions

Here are the most common, frequently asked questions about MicroAI

Cyber-Security – The Escalating Threat

Are cyber-attacks really increasing? Are companies facing increased risk of expose to cyber-intrusion? Are cyber-criminals using more sophisticated tools and methodologies? The answer to all these questions is an unequivocal, yes!

The Cyber Landscape is Changing

While some cyber-criminals continue to rely on tried-and-true methods to penetrate legacy security defenses, many others are continuously developing new techniques that are more insidious and more destructive. The cyber landscape today is hardly recognizable from that of just a few years ago.

Every industry sector that depends on secure performance of machines, and the integrity of the data that they produce, now faces a host of new security challenges.

  • Overwhelming Volume: Global cyber-attacks are increasing at a rate of ~ 300% year over year. The sheer volume of attacks overwhelms the personnel and existing tools responsible for cyber protection.
  • Device Power/Memory Limitations: Many IT and OT edge devices operate on low power and limited memory. These devices are less adaptable to traditional security measures and more vulnerable to attack.
  • Inconsistent Connectivity: Many IT and OT asset ecosystems contain devices and machines that have inconsistent connectivity. Connectivity disruptions increase the risk of cyber intrusion.
  • Inability to Predict Threats: Most legacy security tools are purely reactive. Asset stakeholders have no ability to predict potential cyber threats or to take preventive action.
  • Crippling Ransomware Attacks: Ransomware attacks can result in the temporary or permanent loss of sensitive data. Depending on the scope of the attack, a single asset, an entire factory, or a chain of interconnected factories can be disabled.

The Consequences

Many companies are lulled into a false sense of well-being regarding their cyber-security profile. That sense of well-being quickly dissipates after experiencing a successful cyber-attack. The consequences a cyber-attack can be devastating and long-lasting.

  • Operational Disruption: Todays cyber-attacks (Zero-Day, Ransomware, etc.) can result in a complete breakdown of the operational cycle. Machine, devices, and processes can be disabled for prolonged periods of time, resulting in catastrophic shutdown of product/service deliveries.
  • Loss of Proprietary Data: Sensitive operational and/or financial data can be hijacked. Hackers can then demand a ransom for return of that data. This creates a long-lasting sense of insecurity and apprehension regarding integrity of data.
  • Financial Loss: The overall financial impact of a cyber-attack can be devastating. Depending on the nature and scope of the attack, the cost can be in the hundreds of thousands or millions of dollars. Some companies struggle to recover from such a negative impact.
  • Loss of Customer Confidence: Cyber-attacks not only affect the targeted company, they also impact the company’s customers. Disruption in delivery of products and services can result in the permanent loss of large swaths of customers.

Staying Ahead vs Playing Catch Up

Yesterday’s cyber-security is not effective against today’s increasingly sophisticated cyber-criminal. MicroAI takes endpoint security to the next level of effectivity by combining several AI-enabled security elements into a single, localized, cost-effective solution.

Cyber-security that is Proactive
  • Reduced Cloud Dependence:  Endpoint and Edge security allows all critical data to be collected, synthesized, and analyzed locally. Critical data is not exposed to cloud transmission and storage, significantly reducing its exposure to cyber-attack.
  • Personalized Security: Ability to customize security protocols on an asset-by-asset level to accommodate specific conditions for individual assets or groups of assets.
  • Quicker Alerts and Mitigation: Localized, asset-specific, security that provides quicker notification of security breach and faster activation of mitigation actions.
  • Predictive Security: Predictive analytics produce actionable insights into future threats. Enables a transition from reactive to predictive security.
  • Simple Integration: Quickly onboard and validate security protocols into assets within the IT and OT ecosystem. Eliminates the need for expensive external hardware and costly data labeling.
  • Dynamic security that evolves with the changing threat landscape (protection for today and tomorrow).

Still have question ?

Can’t find the answer you’re looking for ? Please get in touch to our team.


What is Ransomware?

Ransomware is a form of malware that infects devices, machines, or systems. The infection can penetrate an individual asset or expand to infect and entire ecosystem of devices and machines. As the name implies, the malicious actor then demands a “ransom” for the return of access to systems and files.

Should my company be worried about ransomware?

Yes! Every industry is under an increasing ransomware threat. It is estimated that there are ~ 300,000 malware attacks initiated every day. As a comparison, there were ~ 90,000 back in 2012. Most of these attacks result in severe production degradation and/or compromise of proprietary data.

How does a ransomware attack work?

There are five insidious stages to a ransomware attack:

  • Campaign: Campaigns can take several forms but the most common is the use of email. These sophisticated phishing attacks are engineered to encourage you to download the embedded malware.
  • Infection: This is the point where the malware has been embedded into your device or machine. The infection remains dormant and invisible.
  • Search: Now that the malware has a foothold it will begin to search for operating files to contaminate. This can include on-premise files as well as files stored within a cloud environment.
  • Encryption: This is the final stage of the attack. The malicious actor uses symmetric encryption to compromise as much system and operating data as possible. This can bring individual assets or an entire asset ecosystem to a complete halt.
  • Extortion: The attack culminates with a demand for a ransom payment. The attacker demands payment for access to the decryption keys that will allow for return to data access and operational control.

What are the consequences of a ransomware attack?

Ransomware attacks can have a devastating—and long-lasting—impact on your enterprise. As these attacks become more sophisticated the havoc they create is more widespread, harder to detect and more difficult to mitigate. The crippling effects from these cyber-attacks can include:

  • Loss of critical data: A ransomware attack can result in the temporary—or sometimes—permanent loss of your sensitive data. This data can be related to asset performance, financials, suppliers, etc.
  • Disruption of operations: Depending on the scope of the attack, a single asset, an entire factory, or a chain of interconnected factories can be disabled. After the ransom is paid it can take weeks or months to recover to normal operational status.
  • Degradation of supply chain: Suppliers can be impacted by a ransomware attack on an industrial automation company. Suppliers may be hesitant to continue a business relationship with a company that appears vulnerable to cyber-attack.
  • Loss of reputation and market share: Operational and financial disruptions can create a loss of confidence within your company’s targeted market. Market share can be temporarily or permanently impacted.
  • Financial loss: In addition to the ransom that must be paid, all the above will contribute to financial loss and degraded bottom-line performance. This can negatively impact the ability to invest in future technology and innovation.

Will MicroAI Security protect me from ransomware?

Yes! Our breakthrough technology embeds AI-enabled security into the extreme endpoint of your device, machine, or process (i.e., “the edge of the edge”). This Edge-native AI approach to cyber-security provides hardened protection against ransomware attack.

How does MicroAI Security work and how is it different from other solutions?

Legacy security solutions are increasingly ineffective against today’s ransomware attacks. MicroAI Security offers the following advantages when compared to traditional approaches to cyber-security:

  • Machine and device centric: Endpoint security is embedded directly into your asset’s MCU or MPU. Security that can be customized for a specific device or machine.
  • Customized algorithms: Predictive AI and ML algorithms that live, train, and learn directly on the targeted asset, providing the ability to predict potential ransomware attacks.
  • Real-time alerts and reactions: Endpoint security provides you with quicker detection and reaction to ransomware infections. This allows you to mitigate the spread and impact of an attack.
  • Local monitoring and data processing: Processing critical data at the endpoint eliminates security risks associated with cloud processing. Protection that is more robust and more cost-effective.

Will we have to pay high data transmission costs?

MicroAI Security is unique in that in processes more data locally, thereby reducing the amount of data that must be transferred and stored in the cloud. For data-intensive operations this can result in annual saving in the hundreds of thousands of dollars.

How soon can MicroAI be up and running in my environment?

Speed of implementation is imperative in ransomware protection. MicroAI Security can be deployed and provided protection within a couple of weeks as opposed to months. Our solution can be deployed on a single asset, multiple assets, or across an entire ecosystem of assets. Ransomware protection in weeks instead of months.

How do I learn more or request a demo?

Click here to learn more or to request a demonstration of MicroAI Security.


Still have question ?

Can’t find the answer you’re looking for ? Please get in touch to our team.