Sign up for our newsletter

Weekly data

Top 10 steps to mitigate ICS vulnerabilities

Number of vulnerabilities to which step applies

Step Vulnerabilities
Network segmentation 376
Secure remote access 337
Ransomware, phishing and spam protection 213
Traffic restriction 148
Threat detection techniques 107
Workstation hardening 100
User and role policy 79
Least-privilege user 74
Defence-in-depth 64
Disable feature 50
Source: Claroty

White Papers

Hot Topics