Obviously that doesn't make those machines secure, but an insecure machine that hasn't been exploited is better than an insecure machine that has.
Obviously that doesn't make those machines secure, but an insecure machine that hasn't been exploited is better than an insecure machine that has.