The problem is, it’s not secure! As evidenced by numerous breaches, perhaps most notably in the Ukranian power grid incident, malicious actors can utilize these same remote access pathways, through phishing, brute force, malware, etc., to gain entry into (and sometimes even control of) operational networks. Even if the data inside these networks may not be sensitive, the systems within them are often extremely sensitive, and in some cases, such as in water treatment, chemical processing, and other critical infrastructure, their protection is vital to the safety and well-being of the public.