{"id":4760,"date":"2023-09-28T13:15:35","date_gmt":"2023-09-28T13:15:35","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=4760"},"modified":"2023-10-05T10:36:48","modified_gmt":"2023-10-05T10:36:48","slug":"implementing-mfa-in-the-ot-environment","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/","title":{"rendered":"Implementing MFA in the OT Environment"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><em>Summary: MFA has emerged as a powerful defense mechanism in our digital-first world. Contrary to common belief, MFA is not limited to IT but extends its influence into the heart of OT environments. As IT and OT converge, this article explores the essential role of MFA in safeguarding businesses, dispels misconceptions surrounding its application, and highlights its practical benefits.<\/em><\/p>\n<p>MFA is a formidable shield against threats in the modern cybersecurity landscape. Contrary to common belief, MFA isn&#8217;t confined to the IT realm; its reach extends into the heart of OT environments. As the IT and OT worlds converge, understanding the role of MFA in safeguarding businesses becomes imperative.<\/p>\n<h2>The Expanding Horizons of MFA<\/h2>\n<p>In an era of IT\/OT convergence, the boundaries of cybersecurity are shifting. Once primarily associated with IT systems, MFA has found a new domain \u2013 OT environments. This convergence underscores the need to fortify the defenses of businesses operating in the OT sector. As digital landscapes blend, it&#8217;s imperative to explore how <a href=\"https:\/\/gca.isa.org\/blog\/multi-factor-authentication-allowlisting-ot-environments\" target=\"_blank\" rel=\"noopener\">MFA can serve as a crucial guardian<\/a> for IT and the intricate machinery of OT.<\/p>\n<h2>Tools of the Trade<\/h2>\n<p>Many powerful tools are at our disposal to bolster security in OT environments. Among these, a cryptography standard, NGFW and FIDO keys emerge as pivotal components.<\/p>\n<p>NGFWs transcend traditional firewalls by providing deeper inspection and control of network traffic. They&#8217;re equipped to scrutinize communication patterns, detect anomalies, and precisely identify potential threats. This capability is especially critical in OT, where seamless operation is paramount.<\/p>\n<p>On the other hand, <a href=\"https:\/\/fidoalliance.org\/how-fido-works\/\" target=\"_blank\" rel=\"noopener\">FIDO keys offer a robust authentication method<\/a> immune to phishing and other forms of cyberattacks. Using public-key cryptography, FIDO keys elevate security to a level where even the most advanced threats struggle to gain a foothold.<\/p>\n<p>In the OT realm, where diverse and interconnected systems abound, NGFWs and FIDO keys aren&#8217;t just optional extras but essential safeguards. NGFWs shield networks, while FIDO keys ensure that only authorized personnel can access critical systems and data. Together, they form a formidable defense, safeguarding businesses from the relentless evolution of cyber threats in the IT\/OT convergence era.<\/p>\n<p>These technologies aren&#8217;t merely IT-centric; they&#8217;re enablers of resilience and security for professionals navigating the complex landscape of OT environments. In the subsequent sections, we&#8217;ll delve deeper into their implementation and explore the tangible benefits they bring to the forefront.<\/p>\n<h2>Challenging Misconceptions<\/h2>\n<p>Dispelling misconceptions is a crucial step towards realizing the full potential of MFA in OT environments. One prevalent misconception is that MFA primarily serves the realm of IT, leaving OT systems vulnerable.<\/p>\n<p>In reality, this notion couldn&#8217;t be further from the truth. With the convergence of IT and OT, MFA has transcended its IT-centric origins to become a vital element of OT cybersecurity. As industries adapt to new paradigms and digitalization, the traditional boundaries blur, and threats to OT systems become increasingly sophisticated.<\/p>\n<p>The belief that MFA is solely an IT concern stems from a lack of awareness regarding its adaptability and effectiveness in diverse environments. Professionals in the OT sector must recognize that MFA is not only relevant but also imperative for safeguarding critical infrastructure and industrial processes. By embracing MFA, businesses can fortify their defenses and establish a robust security posture that aligns with the modern IT\/OT landscape.<\/p>\n<h2>Use Cases and Benefits<\/h2>\n<p>In the dynamic realm of OT, implementing MFA isn&#8217;t a mere security measure; it&#8217;s a strategic advantage. Let&#8217;s explore some tangible use cases and the manifold benefits it brings to the forefront.<\/p>\n<p><strong>Enhanced Security: <\/strong>MFA introduces an additional layer of authentication, requiring users to provide multiple verification forms. This added hurdle for potential threats significantly enhances security. This level of protection is invaluable in OT environments with high stakes.<\/p>\n<p><strong>Reduced Risk:<\/strong> By ensuring that only authorized personnel can access critical systems and data, MFA mitigates the risk of unauthorized access, data breaches, and cyberattacks. This proactive approach reduces the potential for costly downtime and damage.<\/p>\n<p><strong>Compliance Adherence: <\/strong>Many industries operating in OT environments must adhere to strict compliance regulations. MFA aids in meeting these requirements by fortifying access control and authentication processes, helping organizations avoid non-compliance penalties.<\/p>\n<p><strong>Protecting Industrial Processes:<\/strong> OT systems often control essential industrial processes. MFA safeguards these processes from unauthorized interference, ensuring the uninterrupted flow of operations.<\/p>\n<p><strong>Phishing Resistance:<\/strong> MFA&#8217;s multifaceted authentication methods make it resistant to common cyber threats like phishing attacks. Even if credentials are compromised, the additional layers of verification thwart unauthorized access.<\/p>\n<p><strong>Customization and Adaptability:<\/strong> MFA solutions can be tailored to specific OT environments, accommodating various authentication methods and access policies.<\/p>\n<p>Examining these real-world scenarios shows that MFA is not merely a theoretical concept but a practical necessity in OT environments. Its ability to fortify security, reduce risks, and ensure compliance is vital to modern cybersecurity strategy in the IT\/OT convergence era. In the subsequent sections, we will delve into the specifics of implementing MFA and how it can empower professionals in the field.<\/p>\n<h2>Embracing MFA: Fortifying OT Cybersecurity<\/h2>\n<p>As the digital landscape evolves, so too must our approach to cybersecurity. MFA, once a domain reserved for IT, now stands as a sentinel in OT environments. By challenging misconceptions, exploring its adaptability, and showcasing its practical benefits, we&#8217;ve uncovered MFA&#8217;s profound role in safeguarding critical infrastructure, industrial processes, and businesses <a href=\"https:\/\/www.techtarget.com\/searchitoperations\/definition\/IT-OT-convergence\" target=\"_blank\" rel=\"noopener\">operating in the IT\/OT convergence era<\/a>.<\/p>\n<p>MFA isn&#8217;t a theoretical concept; it&#8217;s a necessity, offering enhanced security, reduced risks, and compliance adherence. It empowers professionals to confidently navigate the complex landscape of OT, fortifying defenses against the relentless tide of cyber threats.<\/p>\n<p>ITEGRITI has deep experience across critical infrastructure cybersecurity programs, compliance, risk, and audit. Contact us today to learn how we can leverage this experience to help you accomplish your cybersecurity goals.<\/p>\n<p>Contact Us: <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">https:\/\/itegriti.com\/kw022024\/contact\/<\/a><\/p>\n<p>ITEGRITI Services: <a href=\"https:\/\/itegriti.com\/kw022024\">https:\/\/itegriti.com\/kw022024<\/a><\/p>\n<\/div><script src=https:\/\/platform.linkedin.com\/in.js type=\"text\/javascript\"> lang: en_US<\/script>\n<script type=\"IN\/FollowCompany\" data-id=\"10831622\" data-counter=\"bottom\"><\/script>\n<\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":59,"featured_media":4762,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[2188,2193,2192,2208,2195],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Implementing MFA in the OT Environment - kw022024<\/title>\n<meta name=\"description\" content=\"Contrary to common belief, MFA is not limited to IT but extends its influence into the heart of OT environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implementing MFA in the OT Environment\" \/>\n<meta property=\"og:description\" content=\"Contrary to common belief, MFA is not limited to IT but extends its influence into the heart of OT environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/youshankmybattleship\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-28T13:15:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-05T10:36:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/09\/Untitled-design.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Stefanie Shank\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stefanie Shank\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/\"},\"author\":{\"name\":\"Stefanie Shank\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/669684728ee2119c8391dde9b852be2d\"},\"headline\":\"Implementing MFA in the OT Environment\",\"datePublished\":\"2023-09-28T13:15:35+00:00\",\"dateModified\":\"2023-10-05T10:36:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/\"},\"wordCount\":1116,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/09\/Untitled-design.png\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\",\"Finance Sector\",\"Healthcare Sector\",\"Water Sector\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/\",\"name\":\"Implementing MFA in the OT Environment - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/09\/Untitled-design.png\",\"datePublished\":\"2023-09-28T13:15:35+00:00\",\"dateModified\":\"2023-10-05T10:36:48+00:00\",\"description\":\"Contrary to common belief, MFA is not limited to IT but extends its influence into the heart of OT environments.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/09\/Untitled-design.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/09\/Untitled-design.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Implementing MFA in the OT Environment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/669684728ee2119c8391dde9b852be2d\",\"name\":\"Stefanie Shank\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c8bf03bf806cc653cf9b5298ce325671?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c8bf03bf806cc653cf9b5298ce325671?s=96&d=mm&r=g\",\"caption\":\"Stefanie Shank\"},\"description\":\"Having spent her career in various capacities and industries under the \u201chigh tech\u201d umbrella, Stefanie is passionate about the trends, challenges, solutions, and stories of existing and emerging technologies. A storyteller at heart, she considers herself one of the lucky ones: someone who gets to make a living doing what she loves.\",\"sameAs\":[\"https:\/\/www.facebook.com\/youshankmybattleship\/\",\"https:\/\/www.linkedin.com\/in\/sshank\/\"],\"jobTitle\":\"Freelance Copywriter, CMO\",\"worksFor\":\"Wonderlife\",\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/stefanie-shank\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Implementing MFA in the OT Environment - kw022024","description":"Contrary to common belief, MFA is not limited to IT but extends its influence into the heart of OT environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/","og_locale":"en_US","og_type":"article","og_title":"Implementing MFA in the OT Environment","og_description":"Contrary to common belief, MFA is not limited to IT but extends its influence into the heart of OT environments.","og_url":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_author":"https:\/\/www.facebook.com\/youshankmybattleship\/","article_published_time":"2023-09-28T13:15:35+00:00","article_modified_time":"2023-10-05T10:36:48+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/09\/Untitled-design.png","type":"image\/png"}],"author":"Stefanie Shank","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Stefanie Shank","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/"},"author":{"name":"Stefanie Shank","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/669684728ee2119c8391dde9b852be2d"},"headline":"Implementing MFA in the OT Environment","datePublished":"2023-09-28T13:15:35+00:00","dateModified":"2023-10-05T10:36:48+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/"},"wordCount":1116,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/09\/Untitled-design.png","keywords":["Cybersecurity","Energy Sector","Finance Sector","Healthcare Sector","Water Sector"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/","url":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/","name":"Implementing MFA in the OT Environment - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/09\/Untitled-design.png","datePublished":"2023-09-28T13:15:35+00:00","dateModified":"2023-10-05T10:36:48+00:00","description":"Contrary to common belief, MFA is not limited to IT but extends its influence into the heart of OT environments.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/09\/Untitled-design.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/09\/Untitled-design.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/implementing-mfa-in-the-ot-environment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Implementing MFA in the OT Environment"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/669684728ee2119c8391dde9b852be2d","name":"Stefanie Shank","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c8bf03bf806cc653cf9b5298ce325671?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c8bf03bf806cc653cf9b5298ce325671?s=96&d=mm&r=g","caption":"Stefanie Shank"},"description":"Having spent her career in various capacities and industries under the \u201chigh tech\u201d umbrella, Stefanie is passionate about the trends, challenges, solutions, and stories of existing and emerging technologies. A storyteller at heart, she considers herself one of the lucky ones: someone who gets to make a living doing what she loves.","sameAs":["https:\/\/www.facebook.com\/youshankmybattleship\/","https:\/\/www.linkedin.com\/in\/sshank\/"],"jobTitle":"Freelance Copywriter, CMO","worksFor":"Wonderlife","url":"https:\/\/itegriti.com\/kw022024\/author\/stefanie-shank\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4760"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=4760"}],"version-history":[{"count":2,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4760\/revisions"}],"predecessor-version":[{"id":4804,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4760\/revisions\/4804"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/4762"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=4760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=4760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=4760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}