Critical Vulnerability in OT Security: Insights from Tosi’s Latest Report Before Federal Advisory
In a groundbreaking report examining the state of Operational Technology (OT) security, Tosi has identified vendor remote access as the most critical weakness across various industries. This finding comes just before a federal advisory published on April 7 confirmed the same vulnerability is being exploited by cyber attackers targeting U.S. critical infrastructure. The advisory highlighted that the mode of intrusion involved attackers using manufacturer software to remotely connect to industrial controllers, which were unprotected and accessible over the internet.
Tosi’s report, released earlier in February 2026, represents a comprehensive study surveying 77 major enterprises in sectors such as water management, energy production, manufacturing, financial services, and retail. Alarmingly, the findings underscore that only 1.67 out of 5 was the score for vendor access to systems on manufacturing floors, the lowest recorded score from within this broad dataset.
Sakari Suhonen, CEO of Tosi U.S., stated, "The actors connected to internet-facing industrial controllers just like a legitimate vendor due to the absence of significant security measures that distinguish between authorized and unauthorized access." The federal advisory confirmed that these cyber-attacks on critical infrastructure had commenced in March, underscoring a troubling lag in proactive security protocols.
One of the most critical recommendations from the advisory is to install secure gateways for industrial controllers, thereby eliminating their direct connectivity to the internet. Tosi Gateways are designed specifically for this purpose, acting as a barrier between public internet access and the industrial control systems, which significantly enhances security.
For example, the City of Sandusky, Ohio, which oversees municipal water and wastewater systems, has successfully implemented the Tosi platform, allowing them to maintain secure segregation of their water networks while enabling prompt support from vendors and remote staff when necessary. Matthew DeVries, the IT Manager for the City of Sandusky stated, "Tosi enables us to keep our wastewater and drinking water networks securely isolated, ensuring both safety and accessibility."
Tosi's findings revealed a disturbing prevalence of delayed vendor access rescindment among organizations in the U.S., with one-third indicating that it takes them hours or longer to revoke access after a project concludes, while one in eight reported taking days or even weeks to do so. Furthermore, it was found that the U.S. lags behind Europe in this regard, scoring an average of 6.47 out of 10, compared to Europe's 6.62.
The report also emphasized that organizations with the highest security maturity have successfully transformed their available tools into enforced security protocols, a practice that is sorely lacking in most businesses today. In summary, while Tosi's report reveals a poignant and stark reality for OT security, it also aligns with federal insights warning of a known risk that had yet to be addressed adequately. By adopting appropriate security measures and recognizing the vulnerabilities articulated in both Tosi’s research and the federal advisory, organizations can bolster the integrity of their OT systems against emerging threats.
This 2026 State of OT Security Report, which was developed through primary research conducted with security and operation professionals at U.S. enterprises generating over $1 billion annually, provides critical insights into the landscape of OT security. The comprehensive global study also surveyed practitioners from the U.K., Germany, and Finland. Tosi, established as a leader in Cyber Physical Systems for OT networks, is committed to improving the security of industrial devices around the world, emphasizing the urgency for U.S. organizations to enhance their security measures effectively.