-
So basically to protect from ransomware attacks you need a gapped master server with old fashioned terminals which are all kept in a secure space. All inputs and outputs are then subject to a myriad of security checks. The general bozos use a secondary server.
No, because then a normal business can't run. Something like a SCADA system is meant to* run the way that you describe, but that doesn't work for normal business applications.
\* But, not always how they actually do run of course
Yes and no. It can send as you by spoofing your email anddress and BCC the same address I guess, with an MTA in the printer, but without your credentials it can’t send “from” your account, only “as” your account, which might sound like a distinction without a purpose but is meaningful.
The other question is how did the attacker get into Heftys mailbox otherwise?