MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Businesses Running Outdated Software are Taking a Huge Risk, Study Finds

Businesses Running Outdated Software are Taking a Huge Risk, Study Finds

It goes without saying that businesses that don’t want to invest in the latest and greatest software solutions will be denying themselves the opportunity for more productivity and efficiency, but most of all, security will be put on the line. A new study has proven that there is a direct correlation between businesses that run older versions of out-of-date operating systems and web browsers, and organizations that suffer from data breaches.

The organization behind the study, BitSight, found that out of 35,000 companies analyzed worldwide across 20 different industries, over 2,000 of them had over half of their computers running on operating systems that are out of date. Around 8,500 companies also had been using out-of-date browsers. The study focused on those who use Apple and Microsoft operating systems, and included an analysis of the Internet Explorer, Firefox, Safari, and Google Chrome Internet browsers.

The numbers speak for themselves. Businesses that use outdated operating systems are three times more likely to suffer from a data breach. On the other hand, businesses that use outdated browsers are twice as likely to suffer a data breach. Keep in mind that these numbers don’t necessarily reflect that the outdated browsers and operating systems were the direct causes of the data breach. Rather, they are just one factor that was taken into account during the study.

Of course, this shouldn’t come as a surprise. Businesses have long understood that outdated software can provide all sorts of inconveniences, but the amount of organizations that don’t mind dealing with outdated software is a cause for concern. There are far too many businesses out there that don’t take proper care to upgrade away from unsupported software, like Windows XP and Windows Vista.

It almost makes you wonder if your own business is vulnerable to attacks that exploit outdated software, and what you can do about it.

For starters, you can perform a network audit to make sure that none of the software used by your organization--including operating systems and web browsers--are out of date. To do this, you need to reach out to an unbiased and trusted third-party consultant who can give you a clear idea of what needs to be done to shore up weaknesses in your infrastructure. The importance of this cannot be stressed enough, especially in the wake of highly publicized threats like the WannaCry ransomware and other dangerous threats.

MERIT Solutions can be the one to deliver this comprehensive network security audit. To learn more about what we can do for your business, reach out to us at (757) 420-5150.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 22 November 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Best Practices Business Computing Hackers Malware Software Network Security Hosted Solutions Backup google Internet Productivity Microsoft Disaster Recovery Computer Business Continuity Managed IT Services Business Windows 10 IT Support VoIP Outsourced IT Innovation IT Services User Tips Business Management Hardware Mobile Devices communications Managed IT Mobility Productivity Windows Mobile Device Management Ransomware Efficiency Email Smartphone Save Money Cybercrime Saving Money Telephone Systems Small Business Server Operating System Hosted Solution Quick Tips Data Backup Android Cybersecurity Virtualization Apps Law Enforcement Recovery VPN Microsoft Office Passwords browser BYOD Password Data BDR Money Data Recovery Information Technology Chrome Wireless Communication Budget Smartphones Data Management Unsupported Software Facebook Government Cloud Computing Work/Life Balance Google Drive Hacking Avoiding Downtime Health Miscellaneous Managed Service Provider Computers Office 365 Social upgrade search App USB Phishing Save Time Managed IT Services Risk Management Shortcut Data Security Automation Gadgets Wi-Fi Firewall Workplace Tips Telephony Application Alert Holiday Current Events Audit Office tips Applications Private Cloud Personal Information Proactive IT Politics Social Media Best Practice Going Green Bandwidth The Internet of Things Vulnerability Saving Time Cleaning Humor Disaster Spam Office Phone System Computer Care Employer-Employee Relationship Data Storage Users User Error Encryption Network Sports Identity Theft Artificial Intelligence Hacker Gmail Solid State Drive Flexibility Internet Exlporer Wireless Technology Update Cost Management Google Docs iPhone IT solutions SaaS Mobile Computing DDoS Antivirus Transportation Data Protection Samsung Content Filtering IT Support Battery HaaS Robot Television Social Engineering Commerce Compliance History End of Support Apple Remote Computing Streaming Media Automobile WiFi Windows 10 Internet of Things Business Intelligence Touchscreen Document Management Reputation Lifestyle Experience Advertising Outlook Word remote Managed IT Service eWaste Legislation Yahoo Video Games Data storage Excel iOS Running Cable Virtual Reality Windows Ink Server 2008 Chromecast Scam Administration Comparison Ali Rowghani Trending Music Legal Regulation Computer Fan Google Maps OneNote Screen Mirroring Data Breach Employer Employee Relationship Colocation Specifications Analytics Hard Drives Sync Tech Support Dark Web Keyboard Instant Messaging Software as a Service server installation dvd "cannot install required files" Files Meetings stock Administrator Cast Lithium-ion battery Emails Computer Accessories Worker Commute Sales Big Data Adobe Mobile Device Managing Stress Data Loss Settings Retail tweet Access Marketing Relocation Books Scalability Licensing Hiring/Firing Education calculator Twitter Router HBO Webinar Vendor Management PDF How To Mobile control Benefits Microsoft Excel WSJ IT solutions Unified Threat Management Text Messaging Professional Services Exchange Collaboration Distributed Denial of Service File Sharing altivista Entertainment IT Management Windows 10s Training Upgrades Electronic Medical Records Travel SBS Nanotechnology Point of Sale Storage compaq HIPAA WIndows Server 2008 Hard Disk Drive Company Culture Consultant Wearable Technology Black Market Laptop Tablets Uninterrupted Power Supply Root Cause Analysis Smart Technology Cortana hp Avoid Downtime Patch Management Value Two-factor Authentication Shadow IT Touchpad NFL domain Augmented Reality Worker CrashOverride Thank You Congratulations WannaCry Cache Monitors Remote Monitoring Safety Emergency

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...