Researchers Examine Widespread ICS Vulnerabilities and Mitigation Strategies