“... Among the victims ... were many systems that were completely unprotected ... just because no one thought they had to be ... But in those cases, the attackers did not choose their targets; they infected everything they could. The damage was significant. Reinstalling operating systems on those noncritical machines was and continues to be a costly time-sink... Lesson 2: Protect all elements of your information infrastructure...”
No comments:
Post a Comment