I agree completely. It was more an observation that keeping important systems isolated is at least enough of a thing for attackers to be already trying to work around it; if anything, I'd take that as a sign that critical infrastructure that's not isolated is dangerously behind the times.