![f0120-03](https://article-imgs.scribdassets.com/37d111xw1scgll9j/images/fileL8JVG6YP.jpg)
![f0120-10](https://article-imgs.scribdassets.com/37d111xw1scgll9j/images/fileKGLHCNUX.jpg)
I would really quite like to quote you a whole load of security statistics, provided by NordLayer.com, revealing the proportion of your workforce that’s likely to let in your next malware outbreak or ransom attack. I’d like to, but I can’t, because NordLayer’s website doesn’t want to present the report PDF on my positively Jurassic mix of hardware and browser.
Regulars may recall that I have been goofing around with a few Mac Pros, of vintages as far back as 2011. These are being re-adopted by lots of people, so it’s not impossible that they’ll crop up in small business infection/ransom situations. A couple of my Mac Pros are out with customers, running as foreign servers, not sharing login data with the rest of the network; the most likely playout of an infection event is that I, or someone very like me, will be sitting at one of those machines, aiming to resurrect the rest of the network from the backups machine by machine. The ancient nature of the Mac Pros’ OS is a main plank of its resistance to modern infection.
Real security people shake their heads at such a concept. The reason I couldn’t even see the PDF I wanted was because I was on an old platform,