(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage--namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

BitSight found that out of 35,000 companies from over 20 different industries, over 2,000 of them were running on operating systems that are out of date. Furthermore, 8,500 of these companies also ran out-of-date Internet browsers. This particular study focused on organizations using Apple and Microsoft operating systems, as well as the Internet browsers Internet Explorer, Firefox, Safari, and Google Chrome.

It’s clear that organizations that rely on outdated operating systems are three times more likely to suffer from a data breach. Likewise, organizations that use outdated web browsers are twice as likely to suffer from data breaches. While these numbers don’t necessarily show that this outdated software were directly responsible for data breaches, it’s still an important factor that cannot be ignored.

Granted, this shouldn’t be a surprise for any security-minded business professional. It’s been noted for a long time that software, while invaluable, can create any number of issues for organizations. Chief among these is outdated software. As more businesses remain in operation for extended periods of time, they continue to use unsupported software rather than upgrade to more recent versions. Examples of these business software include Windows XP and Windows Vista. What can you do to keep your own business from falling victim to these unfortunate side-effects of using outdated software?

The solution is simple--update your software. This is easier said than done, especially when time and resources are two pertinent issues. The easiest way to get a feel for how your business stands on this issue is to get a network audit from a trusted technology service provider. This will provide an unbiased analysis of how you can shore up weaknesses in your network infrastructure--including outdated software applications. The importance of such an audit cannot be underestimated, especially considering the amount of high-profile threats that like the WannaCry ransomware.

How does your business rate regarding network security? To get an understanding of this important aspect of running your organization, reach out to us at 407-478-6600.

4 Ways to Secure Your Business and Ensure Complian...
Are You Making Your Business Vulnerable to Project...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Cloud Managed IT Services Best Practices Privacy Business Computing Network Security Hackers Technology Backup Email Outsourced IT VoIP Microsoft Malware Data Backup Business Continuity Software Saving Money Mobile Devices IT Support Google Hosted Solutions Small Business Disaster Recovery Android Smartphones How To Hardware Data Recovery Cybersecurity Data Efficiency Business Ransomware Chrome Avoiding Downtime Two-factor Authentication Managed IT Services Managed IT User Tips Cloud Computing Communication Law Enforcement Communications App Spam Mobile Device Management Collaboration Alert BYOD Gadgets Social Engineering Innovation Computers Compliance BDR Internet Mobility Proactive IT Telephone Systems Windows Cybercrime Router Windows 10 IT Services Phishing Credit Cards Office 365 OneNote Remote Monitoring Data Breach Data Security Solid State Drive Redundancy Business Owner Spam Blocking Holiday Value Money Operating System Bandwidth Apps Budget Data Storage Browser Workers Artificial Intelligence Save Money Vulnerability Business Intelligence Employer-Employee Relationship Firewall Social Media Virtualization Flexibility IT Management Information Technology Productivity Server Wi-Fi Smartphone Computer Passwords Network Work/Life Balance Bring Your Own Device Unsupported Software Business Management Identity Theft Internet of Things Word Office Tips Health Servers Website Virtual Reality Settings Google Apps Patch Management Botnet Physical Security webinar Lifestyle Computer Care Fraud Flash Worker Commute Infrastructure Scam Travel Hard Drives Data loss Conferencing Mobile Computing Samsung Amazon Downtime Private Cloud Screen Mirroring HBO Recovery IT Support Data Protection Amazon Web Services Sync Document Management Root Cause Analysis Mobile Device Public Cloud Software as a Service Cast Outlook Comparison Online Shopping Telephony Productivity The Internet of Things Save Time Windows 10s Risk Management Meetings Networking Government Specifications Frequently Asked Questions SaaS Evernote Skype Users Current Events Update Millennials Excel Black Market Audit HaaS Wireless Charging Start Menu Upgrade Hacking Data Warehousing Knowledge Google Drive Workforce Tip of the week Wireless Battery Emails Facebook Fiber-Optic Content Filtering Mobile Windows 10 Remote Computing Network Congestion Google Docs Charger Telecommuting Windows Server 2008 Education Computer Fan Cables Computing Infrastructure Professional Services IT Plan IT Consultant Voice over Internet Protocol Cortana Remote Work Windows 7 Wireless Technology Applications FENG Unified Communications Tools Hacker Marketing Leadership Multi-Factor Security Unified Threat Management Keyboard Regulations Microsoft Office Netflix Theft End of Support Technology Tips Software Tips Trending Cleaning Experience Customer Service Audiobook Internet exploMicrosoft Office Mobile Office Instant Messaging Computer Accessories Files Music Domains Entertainment CrashOverride Legal Advertising Relocation How to Bluetooth Password History Wearable Technology Public Speaking Best Practice Automation Password Manager Transportation Humor Lithium-ion battery Techology USB Augmented Reality Tech Support Benefits Safety Shadow IT Worker Loyalty User Error Troubleshooting Hybrid Cloud Smart Technology Hiring/Firing Competition Rootkit Hosted Solution Fun Big Data Politics PDF Miscellaneous Quick Tips Training HIPAA Video Games Two Factor Authentication WiFi Vendor Management Assessment Colocation Search Automobile Presentation Webinar Data Management Television Books Scalability Electronic Medical Records 5G IT solutions Public Computer Internet Exlporer Managed Service Provider IBM Customer Relationship Management Content Emergency IP Address Workplace Tips Employer Employee Relationship

      Mobile? Grab this Article!

      QR-Code dieser Seite