This paper provides a high-level overview of software trustworthiness for developers, owner-operators and decision makers in industrial internet of things (IIoT) systems. We address various aspects of creating, acquiring and protecting software. We provide practical and actionable best practices for recognizing, addressing managing and mitigating risks and their sources, whether developed in-house or acquired.