MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Businesses Running Outdated Software are Taking a Huge Risk, Study Finds

Businesses Running Outdated Software are Taking a Huge Risk, Study Finds

It goes without saying that businesses that don’t want to invest in the latest and greatest software solutions will be denying themselves the opportunity for more productivity and efficiency, but most of all, security will be put on the line. A new study has proven that there is a direct correlation between businesses that run older versions of out-of-date operating systems and web browsers, and organizations that suffer from data breaches.

The organization behind the study, BitSight, found that out of 35,000 companies analyzed worldwide across 20 different industries, over 2,000 of them had over half of their computers running on operating systems that are out of date. Around 8,500 companies also had been using out-of-date browsers. The study focused on those who use Apple and Microsoft operating systems, and included an analysis of the Internet Explorer, Firefox, Safari, and Google Chrome Internet browsers.

The numbers speak for themselves. Businesses that use outdated operating systems are three times more likely to suffer from a data breach. On the other hand, businesses that use outdated browsers are twice as likely to suffer a data breach. Keep in mind that these numbers don’t necessarily reflect that the outdated browsers and operating systems were the direct causes of the data breach. Rather, they are just one factor that was taken into account during the study.

Of course, this shouldn’t come as a surprise. Businesses have long understood that outdated software can provide all sorts of inconveniences, but the amount of organizations that don’t mind dealing with outdated software is a cause for concern. There are far too many businesses out there that don’t take proper care to upgrade away from unsupported software, like Windows XP and Windows Vista.

It almost makes you wonder if your own business is vulnerable to attacks that exploit outdated software, and what you can do about it.

For starters, you can perform a network audit to make sure that none of the software used by your organization--including operating systems and web browsers--are out of date. To do this, you need to reach out to an unbiased and trusted third-party consultant who can give you a clear idea of what needs to be done to shore up weaknesses in your infrastructure. The importance of this cannot be stressed enough, especially in the wake of highly publicized threats like the WannaCry ransomware and other dangerous threats.

MERIT Solutions can be the one to deliver this comprehensive network security audit. To learn more about what we can do for your business, reach out to us at (757) 420-5150.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 20 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Network Security Business Computing Hackers Malware Software Productivity Internet Hosted Solutions Managed IT Services Business Management Backup google Mobile Devices Computer Disaster Recovery Outsourced IT Business Microsoft IT Support Business Continuity Hardware communications VoIP Windows 10 Innovation Email Cybersecurity User Tips IT Services Data Backup Efficiency Tech Term Cybercrime Windows Small Business Managed IT Apps Server Ransomware Mobility Internet of Things Data Recovery Saving Money Mobile Device Management Data Smartphone Operating System Law Enforcement browser Productivity Android Virtualization BDR Money Office 365 Save Money Telephone Systems Quick Tips Cloud Computing Data Security Smartphones Phishing Passwords Hosted Solution Password Holiday Microsoft Office BYOD Automation Chrome Managed Service Provider IT Support Communication Information Technology VPN Recovery Network Gadgets Workplace Tips Data Breach Risk Management Unsupported Software Google Drive Hacking Avoiding Downtime Social upgrade Alert Health Work/Life Balance Cost Management Miscellaneous Collaboration Wi-Fi Computers App Application Social Media Best Practice Facebook Government Budget Vulnerability Data Management Two-factor Authentication Wireless Update Tech Support Blockchain Wireless Technology Users Identity Theft Social Engineering Artificial Intelligence Streaming Media Flexibility Telephony Shortcut Data Protection search Router Office tips Firewall Applications Private Cloud History Antivirus Remote Computing Current Events Proactive IT Audit User Error Compliance The Internet of Things Personal Information Spam Politics Gmail Employer-Employee Relationship Managed IT Services Cleaning USB Save Time IT solutions OneNote Computer Care Phone System Hacker Management Networking DDoS Solid State Drive Legal Internet Exlporer Encryption Data Loss Television Mobile Security Marketing iPhone Devices Google Docs Apple Big Data Mobile Computing Transportation Google Assistant WiFi Education Vendor Management Robot Fraud Going Green SaaS Bandwidth Redundancy Samsung End of Support Travel eWaste Commerce Content Filtering Battery HaaS Cortana Patch Management Windows 10 Project Management Disaster Humor Automobile Value MSP Wireless Charging Excel Saving Time Sports Data Storage Office Twitter Hard Drives Unified Communications Video Games IT budget Google Maps Virtual Reality Files Analysis Specifications Screen Mirroring control Scam Administrator Lithium-ion battery Maintenance Sync Dark Web Software as a Service Meetings WSJ Music Financial App store Sales Cast Emails Exchange Employer Employee Relationship altivista Relocation Access Financial Technology Workers Device Security Adobe Distributed Denial of Service Settings Analytics Bring Your Own Device Identities Instant Messaging Retail Keyboard SBS WannaCry Computer Accessories compaq Worker Commute Printing Updates Licensing Mobile Device PDF Hybrid Cloud IoT Managing Stress Identity Conferencing HBO Wearable Technology Webinar hp Microsoft Word Spyware Mobile Language Microsoft Excel Remote Monitoring Text Messaging Books Business Technology Scalability Data Privacy Gifts IT solutions Hiring/Firing domain Computer Forensics Professional Services File Sharing Wasting Money How To Hard Drive IT Management Windows 10s Benefits remote Nanotechnology Yahoo PowerPoint Edge Virus Storage Unified Threat Management Laptop Amazon Uninterrupted Power Supply Chromebook Credit Cards WIndows Server 2008 Running Cable Hard Disk Drive Server 2008 Root Cause Analysis Training Ali Rowghani Entertainment Wireless Internet Ciminal Tablets Proactive Trending Upgrades Electronic Medical Records Touchpad Virtual Assistant Reputation Point of Sale Smart Tech FAQ Augmented Reality Company Culture Advertising HIPAA Gamification NFL Websites Lifestyle Business Intelligence Consultant Touchscreen Safety Alexa for Business Black Market Connectivity Charger Outlook Smart Technology server installation dvd "cannot install required files" stock Data storage Memory Avoid Downtime Word Data Theft Legislation Managed IT Service Shadow IT Administration Document Management Chromecast Content Filter iOS tweet Experience Students intranet Windows Ink Computing Comparison calculator Colocation Monitoring Evernote Regulation Computer Fan Worker Cache Monitors Thank You Emergency CrashOverride Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...