Supervisory Control And Data Acquisition (SCADA) networks are used to control large industrial machines and systems remotely. SCADA systems were designed for efficiency, not security, so they are vulnerable to exploitation. There are numerous entry points for attackers, including wireless networks connecting SCADA systems, gateways between computer and SCADA networks, and modifying unencrypted command traffic. Organizations need to implement controls separating SCADA networks, monitor for abnormalities, regularly upgrade firmware, and consider the human element for securely controlling SCADA systems.