The security of OT environments presents companies with significant challenges. At the same time, there are some potentially dangerous myths circulating about this topic. This article dispels five of them.
With the increasing IT-OT convergence, so-called operational technology also needs to be secured —for this, expertise is also required to avoid falling for common myths.
Mirco Kloss works as Business Development Director DACH at TX One Networks.
Can you protect your production facility with the same means as your office computer? Is an OT environment really isolated from the rest of the world and thus secure by an air gap? Is the top priority in OT security really to protect the network?
There are many questions about how to best protect an OT environment from attacks. The impact of a successful cyber-attack and the associated interruption of production can have fatal financial and reputational consequences for a company. In the healthcare sector, they can even endanger life and limb. Therefore, OT managers should be well informed about the differences and similarities between IT and OT environments. Correcting the most common myths in OT cybersecurity is the first step in this.
Myth #1: OT Systems are Completely Isolated And Therefore Secure
The widespread notion is that OT systems are protected by a so-called air gap. This means that all machines in the OT network are isolated from the outside world, thereby preventing them from establishing external connections. The OT network can thus neither communicate with the internet nor with the in-house IT and is therefore safe from attacks. That’s the theory. However, the practice nowadays is usually different. A fully isolated production environment is more the exception than the rule. And even when it is isolated, it is often only individual machines, rarely the entire network.
In reality, these systems receive updates, have access via a VPN, or possess other remote access. Especially since the COVID-19 pandemic, this has been integrated into many machines to allow control remotely from home in exceptional cases. Many devices also communicate with in-house IT, which, of course, communicates with the internet. Therefore, in most cases, isolation is not present. Even a Wi-Fi stick that makes device maintenance easier, personal laptops, or USB sticks are a way to break the air gap. A fully isolated OT environment thus rarely exists, and accordingly, protection against attacks is not guaranteed.
Myth #2: Protection Against Malware is Also a Priority in OT
In IT, it is common and entirely correct that protecting the network from any kind of malware and exploiting vulnerabilities is the top priority. After all, you want to protect sensitive data. A PC can also be isolated and disconnected from the network if this prevents the further spread of, for example, malware. In production and other OT environments, this is not so easily possible, as the failure of machines can result in significant financial damage that must be avoided at all costs. Also, in the case of medical devices in hospitals, uninterrupted operation is crucial. Think of life-sustaining equipment. A failure of these could have catastrophic consequences.
In OT, ensuring smooth operation is the top priority. The availability of plants and equipment takes precedence. Based on this, solutions must be devised on how the network can be best protected against external and internal attacks without interrupting operations or having to take machines offline temporarily.
Myth #3: OT Cybersecurity is the Responsibility of IT
The shortage of skilled workers in the IT sector is well-known and likely won't be resolved quickly. The situation is no better in the OT sector, quite the opposite. This reinforces the belief that comprehensive cybersecurity only requires a good IT team. However, this team does not have the experience or necessary expertise to ensure the required protection in OT. Similarly, an OT team alone cannot be responsible for IT security.
The only solution is cross-team collaboration, combining the experience and knowledge from both sides to ensure optimal protection for the entire company. This also addresses the skills shortage by ensuring internal IT teams, often already operating at maximum capacity, are not additionally burdened with OT protection; instead, external professionals are consulted. The best security for IT and OT comes from native IT security and native OT security, both of which eventually converge in a Security Operation Center (SOC).
Myth #4: An OT Environment is Protected With a Firewall And Antivirus Solutions
IT focuses its protection mainly on offices and data centers and on confidential data. Longer latency times are less of an issue here than in OT. Additionally, the systems are usually renewed every three to five years. An OT environment is entirely different: individual machines are sometimes in use for ten, 15, or 20 years because they are expensive to purchase and designed for long-term use. Consequently, the software is also outdated. New patches and updates can often only be installed when the machine is offline, which is often avoided for the reasons mentioned.
Date: 08.12.2025
Naturally, we always handle your personal data responsibly. Any personal data we receive from you is processed in accordance with applicable data protection legislation. For detailed information please see our privacy policy.
Consent to the use of data for promotional purposes
I hereby consent to Vogel Communications Group GmbH & Co. KG, Max-Planck-Str. 7-9, 97082 Würzburg including any affiliated companies according to §§ 15 et seq. AktG (hereafter: Vogel Communications Group) using my e-mail address to send editorial newsletters. A list of all affiliated companies can be found here
Newsletter content may include all products and services of any companies mentioned above, including for example specialist journals and books, events and fairs as well as event-related products and services, print and digital media offers and services such as additional (editorial) newsletters, raffles, lead campaigns, market research both online and offline, specialist webportals and e-learning offers. In case my personal telephone number has also been collected, it may be used for offers of aforementioned products, for services of the companies mentioned above, and market research purposes.
Additionally, my consent also includes the processing of my email address and telephone number for data matching for marketing purposes with select advertising partners such as LinkedIn, Google, and Meta. For this, Vogel Communications Group may transmit said data in hashed form to the advertising partners who then use said data to determine whether I am also a member of the mentioned advertising partner portals. Vogel Communications Group uses this feature for the purposes of re-targeting (up-selling, cross-selling, and customer loyalty), generating so-called look-alike audiences for acquisition of new customers, and as basis for exclusion for on-going advertising campaigns. Further information can be found in section “data matching for marketing purposes”.
In case I access protected data on Internet portals of Vogel Communications Group including any affiliated companies according to §§ 15 et seq. AktG, I need to provide further data in order to register for the access to such content. In return for this free access to editorial content, my data may be used in accordance with this consent for the purposes stated here. This does not apply to data matching for marketing purposes.
Right of revocation
I understand that I can revoke my consent at will. My revocation does not change the lawfulness of data processing that was conducted based on my consent leading up to my revocation. One option to declare my revocation is to use the contact form found at https://contact.vogel.de. In case I no longer wish to receive certain newsletters, I have subscribed to, I can also click on the unsubscribe link included at the end of a newsletter. Further information regarding my right of revocation and the implementation of it as well as the consequences of my revocation can be found in the data protection declaration, section editorial newsletter.
IT solutions like firewalls, antivirus software, and the like do not work in the OT environment. They are ineffective, barely understand native OT protocols, sometimes require high network latency which isn't present in OT, and offer no solutions for limited computer resources or lack of internet access, which is the case with many OT systems. Other conditions in such environments pose additional challenges, such as high temperatures, humidity, and vibrations. Different approaches and solutions must interact here, like security inspections, endpoint protection, network defense, and virtual patching.
Myth #5: You Can Only Protect What you Know is in the Network.
While IT security primarily focuses on the visibility of vulnerabilities to be patched, OT must first ensure necessary prevention. Merely making a threat visible does not help here. It also requires the ability to eliminate it. Good and comprehensive OT security first identifies the devices, protects them with multilayered adaptive OT protection, detects and analyzes anomalies, and continuously adapts protection using threat data. The key is to avoid a recovery process, which is lengthy and costly.
Specialized Knowledge Needed for OT Security
Those who know the common myths surrounding OT security can avoid mistakes in protecting their own production environment and thus make it more secure. A completely isolated production environment is as much an illusion as adequate protection of it through conventional firewalls or antivirus solutions. This task is therefore not an IT problem but must be handled by specialists in OT security.
The visibility of existing vulnerabilities must always go hand in hand with the prevention of attacks. The key to success for comprehensive cybersecurity across the entire company lies in the collaboration of both IT and OT teams. The smooth and uninterrupted operation of machines is always the top priority.
Secure and Compliant Authentication in Laboratories