this post was submitted on 01 Aug 2023
90 points (96.9% liked)

[Dormant] moved to !space@mander.xyz

10767 readers
1 users here now

This community is dormant, please find us at !space@mander.xyz

You can find the original sidebar contents below:


Rules

  1. Be respectful and inclusive.
  2. No harassment, hate speech, or trolling.
  3. Engage in constructive discussions.
  4. Share relevant content.
  5. Follow guidelines and moderators' instructions.
  6. Use appropriate language and tone.
  7. Report violations.
  8. Foster a continuous learning environment.

Picture of the Day

The Busy Center of the Lagoon Nebula


Related Communities

πŸ”­ Science

πŸš€ Engineering

🌌 Art and Photography


Other Cool Links

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] ChlorineAddict@lemmy.world 11 points 2 years ago (2 children)

That is horrifying. Windows Server 2003 is 8 years past EOL meaning it hasn’t received any security patches since then. For such a highly regulated industry your entire tech department need’s launched into the sun.

Microsoft Lifecycle Documentation

[–] echodot@feddit.uk 4 points 2 years ago* (last edited 2 years ago) (1 children)

I work in the tech department for a company and I guarantee that they have made management aware and management's response was "No it costs money, so I don't want to. Anyway it's working fine."

It's our job to tell management that they're being idiots, but it really is their responsibility to stop being idiots. If they don't, that's on them, and I have the emails to prove it.

[–] MrPoopyButthole@lemmy.world 2 points 2 years ago

Modern ransomware probably wouldn't run on those old systems anyway haha

[–] CypherPsycho@lemmy.world 3 points 2 years ago (1 children)

Well big businesses can pay Microsoft past the EOL to maintain patches if it's worth it for them. Doubt many do though LOL