You must log in or register to comment.
It is common for security first infrastructures to put machines inside a local network without internet access and just connect a “bridge” pc with internet access to them for management or retriving data.
The vulnerability issue here is if the bridge pc runs Windows. Would be the weakest ring in the chain.
Virtual Private Cutie?