Beyond IT: Protecting operational technology from cyberattacks