End the air gapping myth in critical infrastructure security

Security teams have to dispel the air gapping myth to acknowledge that IT influences can exploit OT connections