W dniu 2017-06-29 o 13:53, Vernooij, Kees (ITOPT1) - KLM pisze:
I'd say: nonsense. A "Social Media Marketing Manager" lecturing technical 
strategies?
The point he is missing, is that Windows is not targeted because it is Windows, 
but because it widely used and therefor efficient to concentrate on. Of course 
no one will write a virus for a DOS BBS system, that is only used at 10 places 
in the world. But if every company moves towards it, the virus writers will 
follow very quickly.

The article is superficial and silly, and you are right the popularity drives the number of attacks, however it's not ONLY the popularity.
It's also design.

Let's imagine z/OS is the most popular server in medium and small business. Installed on PC server under the only IT person's desk (using some preconfigured script). Connected directly to Internet. Will it be as easy as Windows to attack?



Regarding personal computers: for TODAY the easiest method to protect home users (our ants, wives, grandfathers, kids, etc. ) is to install them some kind of Linux. 99% of attack are not apllicable. Majority of such user can easily use Linux as they have been using Windows. A problem with required Windows-only apps can be solved using virtual machine or dual boot or swapppable HDD (this is a little bit more advanced). One say: "that's short-sighted, when Linux gets popularity of Windows, the number of attacks will be as on Windows today". IMHO not true since Linux is more secure by design, HOWEVER IT DOESN'T MATTER, because Linux is not as popular as Windows and won't be tomorrow or within next n years.

IMHO last ransomware attacks are good opportunity to say "it wouldn't happen on non-Windows platform". And repeat it.

My €0.02

--
Radoslaw Skorupka
Lodz, Poland




======================================================================


       --
Treść tej wiadomości może zawierać informacje prawnie chronione Banku 
przeznaczone wyłącznie do użytku służbowego adresata. Odbiorcą może być jedynie 
jej adresat z wyłączeniem dostępu osób trzecich. Jeżeli nie jesteś adresatem 
niniejszej wiadomości lub pracownikiem upoważnionym do jej przekazania 
adresatowi, informujemy, że jej rozpowszechnianie, kopiowanie, rozprowadzanie 
lub inne działanie o podobnym charakterze jest prawnie zabronione i może być 
karalne. Jeżeli otrzymałeś tę wiadomość omyłkowo, prosimy niezwłocznie 
zawiadomić nadawcę wysyłając odpowiedź oraz trwale usunąć tę wiadomość 
włączając w to wszelkie jej kopie wydrukowane lub zapisane na dysku.

This e-mail may contain legally privileged information of the Bank and is 
intended solely for business use of the addressee. This e-mail may only be 
received by the addressee and may not be disclosed to any third parties. If you 
are not the intended addressee of this e-mail or the employee authorized to 
forward it to the addressee, be advised that any dissemination, copying, 
distribution or any other similar activity is legally prohibited and may be 
punishable. If you received this e-mail by mistake please advise the sender 
immediately by using the reply facility in your e-mail software and delete 
permanently this e-mail including any copies of it either printed or saved to 
hard drive.

mBank S.A. z siedzibą w Warszawie, ul. Senatorska 18, 00-950 Warszawa, 
www.mBank.pl, e-mail: [email protected]ąd Rejonowy dla m. st. Warszawy XII 
Wydział Gospodarczy Krajowego Rejestru Sądowego, nr rejestru przedsiębiorców 
KRS 0000025237, NIP: 526-021-50-88. Według stanu na dzień 01.01.2016 r. kapitał 
zakładowy mBanku S.A. (w całości wpłacony) wynosi 168.955.696 złotych.
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to