A quick summary on the risks involved
Once there is a way into the network, very few protections are often in place to prevent attackers from moving laterally between plant floor assets. If these devices are connected to the network, they have open ports; and if they have open ports, they can be enumerated and exploited. It is crucial to find a solution that provides the necessary access for remote support while removing this ‘exposure by default’ posture of critical assets.
This is why BYOS technology is crucial to hardening critical data. With BYOS, lateral movement is relatively impossible. In a hypothetical scenario where a compromised device enters the network, BYOS has the ability to take the blast radius of the attack to a 1:1 ratio.