MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Businesses Running Outdated Software are Taking a Huge Risk, Study Finds

Businesses Running Outdated Software are Taking a Huge Risk, Study Finds

It goes without saying that businesses that don’t want to invest in the latest and greatest software solutions will be denying themselves the opportunity for more productivity and efficiency, but most of all, security will be put on the line. A new study has proven that there is a direct correlation between businesses that run older versions of out-of-date operating systems and web browsers, and organizations that suffer from data breaches.

The organization behind the study, BitSight, found that out of 35,000 companies analyzed worldwide across 20 different industries, over 2,000 of them had over half of their computers running on operating systems that are out of date. Around 8,500 companies also had been using out-of-date browsers. The study focused on those who use Apple and Microsoft operating systems, and included an analysis of the Internet Explorer, Firefox, Safari, and Google Chrome Internet browsers.

The numbers speak for themselves. Businesses that use outdated operating systems are three times more likely to suffer from a data breach. On the other hand, businesses that use outdated browsers are twice as likely to suffer a data breach. Keep in mind that these numbers don’t necessarily reflect that the outdated browsers and operating systems were the direct causes of the data breach. Rather, they are just one factor that was taken into account during the study.

Of course, this shouldn’t come as a surprise. Businesses have long understood that outdated software can provide all sorts of inconveniences, but the amount of organizations that don’t mind dealing with outdated software is a cause for concern. There are far too many businesses out there that don’t take proper care to upgrade away from unsupported software, like Windows XP and Windows Vista.

It almost makes you wonder if your own business is vulnerable to attacks that exploit outdated software, and what you can do about it.

For starters, you can perform a network audit to make sure that none of the software used by your organization--including operating systems and web browsers--are out of date. To do this, you need to reach out to an unbiased and trusted third-party consultant who can give you a clear idea of what needs to be done to shore up weaknesses in your infrastructure. The importance of this cannot be stressed enough, especially in the wake of highly publicized threats like the WannaCry ransomware and other dangerous threats.

MERIT Solutions can be the one to deliver this comprehensive network security audit. To learn more about what we can do for your business, reach out to us at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Software Malware Internet Hosted Solutions Backup Business Management google Managed IT Services Productivity Microsoft Disaster Recovery Computer Outsourced IT Business Continuity Mobile Devices Business IT Support Windows 10 communications VoIP User Tips Productivity IT Services Hardware Innovation Email Cybercrime Mobile Device Management Windows Mobility Managed IT Efficiency Data Backup Smartphone Server Ransomware Cybersecurity Apps Saving Money Data Recovery Save Money browser Telephone Systems Small Business Operating System Law Enforcement Internet of Things Hosted Solution Quick Tips Android Virtualization Chrome BDR Money Information Technology VPN Passwords Recovery Password Holiday Office 365 Microsoft Office Data Security BYOD Data Alert Wireless Health Miscellaneous App Managed Service Provider Communication Computers IT Support Risk Management Unsupported Software Social Media Cloud Computing Best Practice Facebook Government Budget Work/Life Balance Smartphones Data Management Phishing Gadgets Hacking Google Drive Avoiding Downtime Social upgrade search USB Save Time Collaboration Private Cloud Office tips Applications History Proactive IT Identity Theft User Error Windows 10 Flexibility The Internet of Things Shortcut Vulnerability Wi-Fi Firewall Managed IT Services Application Workplace Tips Current Events Audit Data Breach Wireless Technology Personal Information Social Engineering Automation Politics Telephony Two-factor Authentication WiFi Mobile Computing Transportation Saving Time Cleaning Going Green Data Protection Bandwidth Office Robot Computer Care Phone System eWaste Redundancy Legal Project Management End of Support Remote Computing Commerce Users Encryption Cortana Artificial Intelligence Disaster Humor Gmail Cost Management Spam Employer-Employee Relationship Update Excel Blockchain SaaS Data Storage Sports IT solutions Network Samsung Antivirus Content Filtering DDoS OneNote Tech Support Battery HaaS Hacker Internet Exlporer Solid State Drive Television Compliance Data Loss Streaming Media Apple Marketing Automobile iPhone Google Docs Conferencing HBO Webinar Document Management Microsoft Word Edge Mobile domain Experience Text Messaging Microsoft Excel Gifts IT solutions Video Games Ciminal Professional Services remote Yahoo Virtual Reality File Sharing IT Management Scam Windows 10s Travel Running Cable Nanotechnology Server 2008 Music Ali Rowghani Uninterrupted Power Supply Storage Laptop Credit Cards Trending WIndows Server 2008 Employer Employee Relationship Hard Disk Drive MSP Tablets Root Cause Analysis Analytics Keyboard Instant Messaging Touchpad FAQ Reputation Patch Management Computer Accessories Worker Commute intranet Advertising NFL Mobile Device Augmented Reality server installation dvd "cannot install required files" Big Data Business Intelligence stock Touchscreen Managing Stress Lifestyle Charger Outlook Scalability IT budget Word Data storage Books Managed IT Service tweet Hiring/Firing Education Legislation Wireless Charging Maintenance Administration Chromecast Vendor Management iOS Router How To Windows Ink calculator Twitter Benefits Comparison Evernote Device Security Colocation Regulation Computer Fan control Identities Hard Drives Google Maps Unified Threat Management Screen Mirroring WSJ Files Specifications Networking Devices Sync Administrator Training Dark Web Exchange Lithium-ion battery Entertainment altivista Electronic Medical Records Software as a Service Distributed Denial of Service Upgrades Meetings Cast Emails Point of Sale Sales Workers Spyware Relocation Adobe Access Company Culture SBS HIPAA compaq Black Market Consultant Settings Smart Technology Retail Avoid Downtime Updates Fraud Licensing Wearable Technology Value WannaCry hp Shadow IT PDF Monitors Remote Monitoring Worker Thank You Congratulations CrashOverride Safety Emergency Cache

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...