Watch this video on YouTube
What common security flaw should be assessed first when conducting a vulnerability assessment of an ICS environment?