Well, this particular machine is not remote facing, thus far less susceptible to attack. They’d already have to be in the network to launch an attack, and in that case I’m screwed anyway.
Right. I recently found a possible exploit (that I would rather NOT share on a public forum) and killed the exploit public-facing side. I then asked some other pro's, if the stars all aligned and they got past the firewall, and three other things were all perfect for them, they could still use the exploit, so ... now what?
Dude laughed. He goes, "If they pierce the firewall, we have much bigger issues than this one exploit." :)