Not only is operational technology connected to the internet now, cyberattacks can trickle through information technology environments.