Inadequate Boundary Protections Common in Critical Infrastructure: ICS-CERT
The assessments conducted by the U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) in 2016 showed that inadequate boundary protection has remained the most prevalent weakness in critical infrastructure organizations.
Read more: Inadequate Boundary Protections Common in Critical Infrastructure: ICS-CERT
Story added 14. July 2017, content source with full text you can find at link above.