The need for a solid cybersecurity strategy has been discussed and debated for nearly half a century. However, the basic worm-type attacks first documented in 1972 are still with us today. Why? The reason is because even the most basic measures to protect control systems from these types of attacks are still not systematically employed.