FAQs
Select from the options below to display the details required:
Operational Technology (OT) cybersecurity focuses on protecting industrial automation and control systems that operate physical processes. Unlike Information Technology (IT) systems, OT environments prioritize safety, availability and deterministic operation. Cyber incidents in OT can affect equipment, production, or safety systems, so security controls must be designed to avoid disrupting real-time operations.
A successful cyber-attack can lead to unplanned downtime, equipment damage, unsafe operating conditions, or loss of product quality. Strong Operational Technology (OT) cybersecurity reduces operational and safety risks, helps meet regulatory requirements and builds trust with customers who rely on your production environment.
The most widely recognized standards are:
-
IEC 62443 for industrial control system cybersecurity.
-
NIST SP 800 82 for ICS security guidance.
-
ISO/IEC 27001 for establishing information security management systems.
Following these standards helps organizations adopt structured and reliable security controls across their industrial assets.
Common methods include phishing, stolen or weak credentials, remote access misuse, unpatched devices, insecure network pathways between Information Technology (IT) and Operational Technology (OT), and exploitation of exposed services. Attackers often begin in IT networks and move laterally into OT environments.
Key threats include ransomware targeting production workflows, supply chain attacks, insecure remote access, legacy systems with unpatched vulnerabilities, compromised engineering workstations, and unauthorized changes to controller configurations or logic.
Watlow integrates Secure-by-Design principles and a Secure Development Lifecycle aligned with IEC 62443 4 1 and 4 2. This includes secure coding practices, threat modeling, vulnerability management, secure update mechanisms, authentication, logging, and verification activities throughout product development. Some legacy products were originally designed before modern cybersecurity standards matured. Watlow continues to improve the security posture of these products as far as practicable, applying release updates, mitigations and secure configuration guidance where feasible.
Customers are responsible for secure deployment, network configuration, user access management, applying updates, monitoring logs, and implementing appropriate physical and procedural controls. Cybersecurity is a shared responsibility between Watlow and system operators.
Many Watlow products support authenticated and encrypted remote access options. Customers should ensure remote access is protected using VPNs, multi factor authentication, network segmentation, and role-based permissions in line with IEC 62443 guidance.
Best practices include segmenting Operational Technology (OT) networks, restricting external connectivity, disabling unused services, enforcing firewall rules and placing controllers behind secure network zones. Only necessary protocols and ports should be allowed, following the principle of least privilege.
Use only authenticated firmware obtained from Watlow’s official sources, verify integrity signatures when available, and apply updates during maintenance windows. Ensure controllers are protected by access controls, and proper backup procedures.
Watlow devices support event logging features such as authentication events, configuration changes, alarms, and system status messages. Logs can be exported or integrated with customer monitoring systems to support detection, forensics and compliance.
Watlow follows a documented vulnerability management process aligned with industry standards. This includes internal analysis, triage, remediation planning and communication to customers when actionable security information is available. Watlow may also coordinate with external reporting bodies when needed.
Immediately isolate affected systems, preserve logs and follow internal incident response procedures. Customers should contact Watlow support with relevant details so that any potential product related security concerns can be investigated.
Compliance typically involves conducting a security assessment across devices, networks, procedures, and lifecycle processes. Key steps include defining security zones, identifying assets, reviewing security controls and verifying configuration settings. External audits or assessments can also help.
Ensure network segments, access controls, and communication protocols align with your existing security architecture. Validate that devices are deployed with secure default configurations and follow your organization’s change control procedure.
Yes. Many devices offer user accounts, roles, and permissions that restrict access to authorized personnel. Watlow recommends enabling strong authentication, applying least privilege, and reviewing user access regularly.
Recommended practices include:
-
Changing default passwords
-
Disabling unused services
-
Applying latest firmware using encrypted protocols
-
Restricting network reachability
-
Reviewing logs during initial commissioning
These steps help reduce exposure and support IEC 62443 alignment.
Regularly back up controller configurations and store them securely with version control. Ensure recovery procedures are tested, and fail safe functions are configured to maintain safe operation during unexpected events or outages.
Trusted resources include IEC 62443 standards, NIST SP 800 82, CISA ICS advisories, national CERTs, and Watlow’s Cybersecurity Guidelines Help Center. These sources offer high quality guidance and reference architectures for securing industrial environments.
Last update - February 2026