I’ve heard from support teams about enough 2 a.m. crisis calls with plant managers to know the exact moment panic sets in. It usually sounds like this:
“Hey, the vendor needs to log in right now. The Level-2 historian just crashed, we’re bleeding product, and the only guy who can fix it is in Germany.… But if we open the firewall, security goes into a panic. What do we do?”
We all know the two horror stories that live rent-free in every OT leader’s head:
An attacker used a dormant TeamViewer account (shared password, no MFA, zero segmentation) belonging to a former employee and a third-party contractor. In under five minutes, they pushed sodium hydroxide levels to lethal concentrations. The only reason nobody died is that an operator happened to be watching the screen in real time.
The attackers didn’t breach Target directly. They phished the credentials of an HVAC contractor who had remote access to the corporate network for… wait for it… billing and refrigeration monitoring. From there, they pivoted to the POS environment and walked out with 40 million credit cards.
Both incidents have the same DNA:
Fast-forward to 2025, and the situation is actually worse, not better.
Remote maintenance isn’t a “nice-to-have” anymore; it’s the only way to keep a global supply chain running. OEMs, system integrators, and specialty contractors need access at 3 a.m. on a Sunday when the line is down. Denying access isn’t an option. Opening the firewall the old way is career suicide.
So here’s the new reality we live in:
The math is brutal.
We stopped believing you have to choose between uptime and security years ago. The fix is embarrassingly simple when you look at it the right way:
Certificates or hardware-bound keys. No shared accounts. Ever.
Not VLANs. Not firewall rules that get punched full of holes the first time a vendor screams. Real per-session, identity-based microsegmentation that follows the user, not the IP.
Make the OT device invisible to the internet in the first place. If a hacker can’t see it, they can’t target it. (Yes, this is a shameless plug, but it’s also the truth.)
When you put those three together, the 2 a.m. call becomes boring instead of terrifying:
Third-party remote access isn’t going away.
The bad guys already know this and are licking their chops.
You can keep pretending the old way (shared passwords + occasional firewall hole) is “good enough,” or you can give your vendors, your plant, and your security team the one thing they actually agree on: secure, instant, invisible access.
I’ll take the second option every time.
Because the next time your phone rings at 2 a.m., I’d much rather be telling you “It’s handled” than “I’m so sorry.”
P.S. If you want to see precisely how passwordless + cloaking works in your environment (without touching a single PLC), join our webinar tomorrow or drop me a note. The demo still makes grown OT engineers laugh out loud in under 90 seconds.
— Cam Cullen, CMO, Blastwave
Experience the simplicity of BlastShield to secure your OT network and legacy infrastructure.