Remote access tools overused in OT environments, study indicates

Read the original article on Cyber Security Peek.