Any sufficiently advanced technology is indistinguishable from magic.
Any technology, no matter how simple, is magic to those who do not understand it.
I have had cause to think about this lately. I mentioned the confusion of some of the audience at the business blogging with regard to feeds. And its important to remember that these things are on a fairly continuous scale. Which is to say, although I work with networking and servers all the time, there is still technology in this sphere that might as well be magic to me.
Since most businesses these days operate somewhere on this spectrum of technology and magic, its important to have some simple rules to guide our everyday actions with. For lack of a better reference I point to the number one item on Microsoft’s list as the the most exploited.
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore — Microsoft
It just seems to be one more way that unwary users will have their machines exploited, no matter how much we as security professionals do to isolate them from danger. Short of disconnecting their computers from the Internet there’s not much we can do to really protect them. And without email and the world wide web, what fun are computers?