Not surprisingly, after last week's worm, security experts are faulting Microsoft for not providing enough active security measures and quality in their software.
Over the past few years, Microsoft has increased their public statements about security, but most of them have focussed on how users can cope with security problems caused by Microsoft's software not being secure in the first place by using Microsoft-approved patches.
In the past, Microsoft has announced patches for certain defects and then faulted users for not installing them rapidly enough. However, this time, Microsoft has run into two problems:
- They got caught with their pants down. It turns out that Microsoft didn't install the patches on all of their own machines and appears to have gotten very publicly bitten by the worm.
- They released a patch in November that interfered with the patch issued in July which solved this problem. This claim isn't disuputed by Microsoft, but they claim a work-around exists and that users should have followed instructions to prevent it.
All of this has caused one expert (cited in this article) to consider moving to a Macintosh in order to get out of the cycle of security exploits under Windows.