Remote access tools overused in OT environments, study indicates
TLDR: The excessive use of remote access tools in operational technology (OT) environments can increase the attack surface, complicate identity management, and hinder visibility,