Blog

Businesses Running Outdated Software are Taking a Huge Risk, Study Finds

Businesses Running Outdated Software are Taking a Huge Risk, Study Finds

It goes without saying that businesses that don’t want to invest in the latest and greatest software solutions will be denying themselves the opportunity for more productivity and efficiency, but most of all, security will be put on the line. A new study has proven that there is a direct correlation between businesses that run older versions of out-of-date operating systems and web browsers, and organizations that suffer from data breaches.


The organization behind the study, BitSight, found that out of 35,000 companies analyzed worldwide across 20 different industries, over 2,000 of them had over half of their computers running on operating systems that are out of date. Around 8,500 companies also had been using out-of-date browsers. The study focused on those who use Apple and Microsoft operating systems, and included an analysis of the Internet Explorer, Firefox, Safari, and Google Chrome Internet browsers.

The numbers speak for themselves. Businesses that use outdated operating systems are three times more likely to suffer from a data breach. On the other hand, businesses that use outdated browsers are twice as likely to suffer a data breach. Keep in mind that these numbers don’t necessarily reflect that the outdated browsers and operating systems were the direct causes of the data breach. Rather, they are just one factor that was taken into account during the study.

Of course, this shouldn’t come as a surprise. Businesses have long understood that outdated software can provide all sorts of inconveniences, but the amount of organizations that don’t mind dealing with outdated software is a cause for concern. There are far too many businesses out there that don’t take proper care to upgrade away from unsupported software, like Windows XP and Windows Vista.

It almost makes you wonder if your own business is vulnerable to attacks that exploit outdated software, and what you can do about it.

For starters, you can perform a network audit to make sure that none of the software used by your organization--including operating systems and web browsers--are out of date. To do this, you need to reach out to an unbiased and trusted third-party consultant who can give you a clear idea of what needs to be done to shore up weaknesses in your infrastructure. The importance of this cannot be stressed enough, especially in the wake of highly publicized threats like the WannaCry ransomware and other dangerous threats.

White Mountain IT Services can be the one to deliver this comprehensive network security audit. To learn more about what we can do for your business, reach out to us at 603-889-0800.

Related Articles

  • Some of the Value that Cloud Computing Offers Cloud computing is a major player in the way that businesses are approaching their daily operations. This might bring into question whether or not your organization is actually using the cloud in the first place, but one thing is certain--if you haven’t implemented the cloud yet, it’s difficult to n...
  • How to Compose a Successful Business Continuity Plan If you don’t consider the worst-case scenario when preparing your business’ disaster recovery strategy, you’ll inevitably suffer from it when it does happen. Taking into account all of these nuances is one of the main ways your organization can prepare for such an occasion. All of these instances ne...
  • IoT Security is a Key Business Concern The Internet of Things is everywhere, which means that potential security risks are also everywhere. Your business needs to take the risks presented by the IoT into account and prepare accordingly. What are You Willing to Risk?When devising a policy for your company concerning the IoT, you need t...
  • Do You Know How to Determine Your Computing Needs? In most businesses today, the computer is an essential tool. Taking this into consideration, you need to make sure that your staff is equipped with the right tools for their given job… but which tool is the right tool? Here, we’ll review the determinations that will help you make the best choice of ...
  • Tip of the Week: How Small Business Goes About Utilizing Tec... No matter how big a business is, it has to leverage at least some IT in order to be efficient. Unfortunately, some organizations are reluctant to implement new technology if they don’t seem to need it immediately. What these businesses don’t know is that the reason they typically don’t implement new...
  • The Hybrid Cloud’s Usefulness to the Modern Business Cloud computing has revolutionized the way business is done, but most businesses don’t always feel comfortable storing data and hosting critical infrastructure in the cloud. Every business has to determine what kind of computing infrastructure is right for them. Many businesses today have decided to...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions