Utility assets have traditionally been secured by proprietary communications links whose security depends on physical access control and operational obscurity.