How secure are you?
Most in the water business would say yes reasonable but tend to forget that the most common threat is not an external attack, but a computer that is infected is connected on the network. The normal procedure if IT is to block and disconnect when something is detected. But how do you disconnect a process dependent computer? That can be done of course, but now there is a solution to these challenges.