Historically, PLCs were never designed with security in mind since they have been historically air- gapped. With the demand to process operational data for advanced analytics, machine learning, predictive maintenance, and increased visibility into the process control environment increasing, PLCs are more exposed than ever, and attackers are now equipped with additional knowledge and tools[1] that exploit vulnerabilities in PLCs. It is no longer a safe assumption to hide behind the antiquated mindset that the ICS protocols are inherently protected since they use proprietary devices and protocols (security through obscurity). As with most new technology integrations, the initial focus has been on advancing the business use of the information without focusing on the increased attack surface that arises with the connectivity. Disconnected networks that house the critical process and safety PLCs are now at a higher risk of being compromised. It is more important than ever to begin to incorporate secure programming practices.