The Government Accountability Office reported that the taxpayers spent $61bn a year on maintaining nuclear defense systems running on eight-inch floppy disks. The report stated, “The Department of Defense system that coordinated intercontinental ballistic missiles, nuclear bombers and tanker support aircraft runs on an IBM Series-1 Computer — a 1970s computing system — and uses eight-inch floppy disks”.

Chris Thomas, famous for claiming in the US. Senate in 1998 that he could take down the Internet in 30 minutes praised the Department of Defense for using the floppies. Just as with the biological viruses you can guarantee absolute protection with non-exposure, computer immunity can be gained only by being disconnected from the Internet. The advantage of using floppy disks for running the national missile defense is that the legacy system is not connected to a network so that an attacker would need to have physical access to the terminal. Chris Thomas commented on “notoriously reliable computer systems”, “As long as they can make regular copies of the software on the 8 inch floppies so that they don’t degrade, and they have a ready supply of spare parts and new floppies, there’s no reason why the system wouldn’t last another 40 years,” he said.

Now you can follow the example of the Ministry of Defense of the USA, or else you can turn to a professional team of system administrators for a complete IT system security audit to identify and eliminate the holes in your defense system before any criminal exploits them. Especially if you are dealing with the sensitive data such as critical consumer records and proprietary corporate information working in healthcare, financial, government institutions, e-commerce or insurance companies it’s important that you provide the highest security level and full compliance with the most regulations. Whatever you decide, remember that good server management is not about costs for breach repair and recovery — it is about preventing them.

You are welcome to enhance your #IT infrastructure against #cyber attacks with our #sysadmin team at supportex.net. If you mail to eva@supportex.net your IT requirements (hardware, software and concerns) you will receive a custom-tailored offer.