When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

They include a wide range of technologies, such as touchscreens, control panels, and voice commands.

The two agencies said failing to protect the endpoints properly could draw in unwanted attention from cybercriminals.

Digital image of a lock.

Image Credit: Shutterstock

These instances resulted in operational impacts at water systems and forced victims to revert to manual operations.

You might also like