This doc was created to help owners and operators of consuming h2o and wastewater programs (WWSs) with evaluating gaps of their present-day cybersecurity methods and controls and determining steps which could minimize their hazard from cyberattacks.Be suspicious of unpredicted e-mail. Phishing e-mails are now Among the most common pitfalls to the s