MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Businesses Running Outdated Software are Taking a Huge Risk, Study Finds

Businesses Running Outdated Software are Taking a Huge Risk, Study Finds

It goes without saying that businesses that don’t want to invest in the latest and greatest software solutions will be denying themselves the opportunity for more productivity and efficiency, but most of all, security will be put on the line. A new study has proven that there is a direct correlation between businesses that run older versions of out-of-date operating systems and web browsers, and organizations that suffer from data breaches.

The organization behind the study, BitSight, found that out of 35,000 companies analyzed worldwide across 20 different industries, over 2,000 of them had over half of their computers running on operating systems that are out of date. Around 8,500 companies also had been using out-of-date browsers. The study focused on those who use Apple and Microsoft operating systems, and included an analysis of the Internet Explorer, Firefox, Safari, and Google Chrome Internet browsers.

The numbers speak for themselves. Businesses that use outdated operating systems are three times more likely to suffer from a data breach. On the other hand, businesses that use outdated browsers are twice as likely to suffer a data breach. Keep in mind that these numbers don’t necessarily reflect that the outdated browsers and operating systems were the direct causes of the data breach. Rather, they are just one factor that was taken into account during the study.

Of course, this shouldn’t come as a surprise. Businesses have long understood that outdated software can provide all sorts of inconveniences, but the amount of organizations that don’t mind dealing with outdated software is a cause for concern. There are far too many businesses out there that don’t take proper care to upgrade away from unsupported software, like Windows XP and Windows Vista.

It almost makes you wonder if your own business is vulnerable to attacks that exploit outdated software, and what you can do about it.

For starters, you can perform a network audit to make sure that none of the software used by your organization--including operating systems and web browsers--are out of date. To do this, you need to reach out to an unbiased and trusted third-party consultant who can give you a clear idea of what needs to be done to shore up weaknesses in your infrastructure. The importance of this cannot be stressed enough, especially in the wake of highly publicized threats like the WannaCry ransomware and other dangerous threats.

MERIT Solutions can be the one to deliver this comprehensive network security audit. To learn more about what we can do for your business, reach out to us at (757) 420-5150.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 20 July 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Business Computing Best Practices Hackers Malware Backup Hosted Solutions Internet Software Network Security Productivity Computer Business Microsoft Windows 10 Disaster Recovery google Business Continuity Managed IT Services Innovation IT Support VoIP Business Management Hardware IT Services Outsourced IT Mobile Devices Mobility Efficiency Save Money Saving Money Windows communications Productivity Ransomware Operating System Hosted Solution Mobile Device Management Quick Tips Telephone Systems Server Apps User Tips Smartphone Recovery Cybercrime Passwords Managed IT Android Virtualization Data Password Small Business BDR Email Law Enforcement Information Technology Communication Budget Cybersecurity VPN Facebook browser Hacking Avoiding Downtime BYOD Health Miscellaneous Money upgrade Social Wireless search USB Save Time App Smartphones Data Management Government Work/Life Balance Google Drive Firewall Application Gadgets Automation Telephony Workplace Tips Alert Current Events Managed Service Provider Office 365 Computers Private Cloud Office tips Unsupported Software Social Media Chrome Cloud Computing Going Green Bandwidth The Internet of Things Disaster Humor Risk Management Employer-Employee Relationship Identity Theft Network Samsung Flexibility Hacker Audit Solid State Drive Microsoft Office Gmail Internet Exlporer Wireless Technology Wi-Fi Update Antivirus Mobile Computing DDoS Battery Transportation Holiday Saving Time HaaS Robot Television Office Computer Care Personal Information Applications Social Engineering History Cleaning Automobile End of Support Remote Computing Streaming Media Users Best Practice WiFi Internet of Things Reputation Root Cause Analysis Data Breach Keyboard Advertising Data Storage Computer Accessories IT solutions Mobile Device Phone System remote Video Games Augmented Reality Emails eWaste Shortcut Yahoo Virtual Reality Screen Mirroring Data storage Windows 10s Cost Management Running Cable Music Server 2008 Legal Administration Spam Chromecast Hiring/Firing Ali Rowghani Encryption Vendor Management Cast Trending Hard Disk Drive Sports SaaS User Error Analytics Instant Messaging Colocation OneNote Benefits Worker Commute Hard Drives Data Security Tech Support Windows 10 Files Unified Threat Management Big Data server installation dvd "cannot install required files" Managing Stress Meetings Administrator Lithium-ion battery stock Training HBO Vulnerability Upgrades Books Scalability Education Relocation Settings Access Compliance tweet Company Culture Router Data Protection iOS Consultant calculator How To iPhone IT Support IT solutions Smart Technology Twitter Value control PDF Computer Fan Two-factor Authentication Content Filtering Commerce WSJ Entertainment Exchange Text Messaging Dark Web Touchscreen Distributed Denial of Service Electronic Medical Records altivista Point of Sale Data Recovery HIPAA SBS Data Backup Phishing compaq Black Market Business Intelligence Scam Apple Marketing Uninterrupted Power Supply Wearable Technology Politics Artificial Intelligence Avoid Downtime Laptop Nanotechnology Proactive IT Managed IT Services hp Shadow IT Document Management Managed IT Service Employer Employee Relationship Webinar Experience domain Touchpad

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.