253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage--namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

BitSight found that out of 35,000 companies from over 20 different industries, over 2,000 of them were running on operating systems that are out of date. Furthermore, 8,500 of these companies also ran out-of-date Internet browsers. This particular study focused on organizations using Apple and Microsoft operating systems, as well as the Internet browsers Internet Explorer, Firefox, Safari, and Google Chrome.

It’s clear that organizations that rely on outdated operating systems are three times more likely to suffer from a data breach. Likewise, organizations that use outdated web browsers are twice as likely to suffer from data breaches. While these numbers don’t necessarily show that this outdated software were directly responsible for data breaches, it’s still an important factor that cannot be ignored.

Granted, this shouldn’t be a surprise for any security-minded business professional. It’s been noted for a long time that software, while invaluable, can create any number of issues for organizations. Chief among these is outdated software. As more businesses remain in operation for extended periods of time, they continue to use unsupported software rather than upgrade to more recent versions. Examples of these business software include Windows XP and Windows Vista. What can you do to keep your own business from falling victim to these unfortunate side-effects of using outdated software?

The solution is simple--update your software. This is easier said than done, especially when time and resources are two pertinent issues. The easiest way to get a feel for how your business stands on this issue is to get a network audit from a trusted technology service provider. This will provide an unbiased analysis of how you can shore up weaknesses in your network infrastructure--including outdated software applications. The importance of such an audit cannot be underestimated, especially considering the amount of high-profile threats that like the WannaCry ransomware.

How does your business rate regarding network security? To get an understanding of this important aspect of running your organization, reach out to us at 253.777.0763.

Tip of the Week: How to Use Tabs to Their Full Pot...
Are You Making Your Business Vulnerable to Project...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 25 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

iPhone Emails Patch Management Facebook Data Recovery Excel Data Security Government Specifications IT Support Troubleshooting Automation Outlook Network Security Start Menu Network Congestion Chrome Spam Blocking IT Management Social Engineering Cortana Cloud Business Hackers Passwords Conferencing Android Travel Operating System webinar Humor Quick Tips Microsoft Office Remote Monitoring Tools Flexibility Apps Productivity App Outsourced IT Privacy Value Vulnerability Managed IT Services Computer Fan Alert Relocation Cybercrime Private Cloud Two-factor Authentication Phishing Data loss Smartphone Security Worker Word Sync Bring Your Own Device Google Drive Samsung Audit Virtualization Spam Save Money Mobile Device Artificial Intelligence Internet exploMicrosoft Smartphones Social Media Avoiding Downtime Root Cause Analysis Black Market Innovation Internet Exlporer Botnet Business Management Smart Technology Managed IT Services Office IT Consultant Telephony Website Efficiency Technology Best Practice Frequently Asked Questions Software Network IBM Voice over Internet Protocol Email Tip of the week IT Services Office Tips Windows Information Technology Collaboration Mobile Devices Business Computing Comparison Health Hosted Solutions Scam Computers Wi-Fi Marketing OneNote Skype VoIP Computer Bandwidth Upgrade Gadgets Software Tips Downtime Content Productivity Current Events Unsupported Software Presentation Flash HBO Computer Care Microsoft FENG Settings User Error Cloud Computing HaaS Router Budget Data Work/Life Balance Hybrid Cloud Public Cloud Small Business Managed IT Best Practices Screen Mirroring Windows 10 Cast Browser Emergency Data Storage Advertising Trending Files Managed Service Provider Cybersecurity Business Intelligence Windows 7 Tip of the Week Office 365 Solid State Drive Netflix Physical Security Windows 10s Windows 10 BDR Miscellaneous Law Enforcement Redundancy End of Support Business Continuity Internet Multi-Factor Security Data Backup SaaS The Internet of Things Data Breach Networking Leadership Knowledge Ransomware Update Saving Money Google Docs Recovery Hiring/Firing Communication IT Plan Supercomputer Apple Windows Server 2008 User Tips Hardware Meetings How To Malware Safety Employer-Employee Relationship Google Money Server History Backup BYOD Communications Telephone Systems Mobile Device Management

Newsletter Sign Up