(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage--namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

BitSight found that out of 35,000 companies from over 20 different industries, over 2,000 of them were running on operating systems that are out of date. Furthermore, 8,500 of these companies also ran out-of-date Internet browsers. This particular study focused on organizations using Apple and Microsoft operating systems, as well as the Internet browsers Internet Explorer, Firefox, Safari, and Google Chrome.

It’s clear that organizations that rely on outdated operating systems are three times more likely to suffer from a data breach. Likewise, organizations that use outdated web browsers are twice as likely to suffer from data breaches. While these numbers don’t necessarily show that this outdated software were directly responsible for data breaches, it’s still an important factor that cannot be ignored.

Granted, this shouldn’t be a surprise for any security-minded business professional. It’s been noted for a long time that software, while invaluable, can create any number of issues for organizations. Chief among these is outdated software. As more businesses remain in operation for extended periods of time, they continue to use unsupported software rather than upgrade to more recent versions. Examples of these business software include Windows XP and Windows Vista. What can you do to keep your own business from falling victim to these unfortunate side-effects of using outdated software?

The solution is simple--update your software. This is easier said than done, especially when time and resources are two pertinent issues. The easiest way to get a feel for how your business stands on this issue is to get a network audit from a trusted technology service provider. This will provide an unbiased analysis of how you can shore up weaknesses in your network infrastructure--including outdated software applications. The importance of such an audit cannot be underestimated, especially considering the amount of high-profile threats that like the WannaCry ransomware.

How does your business rate regarding network security? To get an understanding of this important aspect of running your organization, reach out to us at 407-478-6600.

4 Ways to Secure Your Business and Ensure Complian...
Are You Making Your Business Vulnerable to Project...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 27 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Cloud Technology Managed IT Services Privacy Network Security Best Practices Business Computing Hackers Email Data Backup VoIP Hosted Solutions Malware Google Microsoft Software Backup Outsourced IT Cloud Computing Data Recovery Business Continuity Saving Money Mobile Devices Internet Android IT Support Data Small Business Cybercrime Disaster Recovery Internet of Things Ransomware Cybersecurity Efficiency Tech Term Innovation User Tips BDR Business Law Enforcement Communication Communications IT Services How To Smartphones Hardware Managed IT Data Protection Virtualization Smartphone Productivity Router Business Intelligence Business Management Phishing Avoiding Downtime Chrome Mobile Device Management Collaboration Two-factor Authentication BYOD Managed IT Services Computers Browser Data Security Redundancy Mobility Network Windows Proactive IT Telephone Systems Windows 10 App Remote Monitoring Spam Money Identity Theft Alert Bandwidth Artificial Intelligence Apps Social Engineering Gadgets Vulnerability Compliance Employer-Employee Relationship Firewall Flexibility Information Technology Social Media Comparison Smart Tech Server Applications Data Storage Work/Life Balance Wi-Fi Computer Bring Your Own Device Passwords Update VPN OneNote Website IT Management Office 365 Solid State Drive Data Breach Business Owner Private Cloud IT Plan Holiday CES Spam Blocking Document Management Mobile Device Unsupported Software IT Support Value Operating System Word Credit Cards Save Money Workers Budget Data loss Infrastructure Big Data Audit Battery Amazon Facebook Users Screen Mirroring Devices Knowledge Password Manager Digital Signature Remote Computing Upgrade HBO Emails IoT Education Content Filtering Amazon Web Services Sync Software as a Service Computing Infrastructure Cast Thought Leadership Network Congestion Data Management Business Mangement Wireless Charger Encryption Windows 10 Outlook Computer Fan Online Shopping Telephony Government Streaming Media IT Consultant Electronic Medical Records Gmail Strategy Specifications Frequently Asked Questions FENG Insurance Cortana Evernote Skype Wireless Technology End of Support Content Filter Leadership Recycling Unified Threat Management Analysis Keyboard Millennials Excel Netflix Practices Virtual Reality Wireless Charging Hacker Office Tips Start Menu Marketing Health Data Warehousing Storage eWaste Microsoft Office Cleaning Workforce Tip of the week Settings Hosted Computing Technology Tips Worker Commute Patch Management Fiber-Optic Mobile Legal Google Docs webinar Criminal Computer Care Accountants Telecommuting Windows Server 2008 Inventory Scam Cables Password Professional Services Voice over Internet Protocol Addiction Conferencing Samsung Hard Drives Recovery Remote Work Windows 7 Downtime Access Control Automation Unified Communications Tools Content Management Multi-Factor Security Public Cloud Cache Regulations Root Cause Analysis Authentication Save Time Theft Blockchain Trending Software Tips Wireless Internet Risk Management Servers Windows 10s Botnet Meetings Nanotechnology Networking Google Apps Human Resources Productivity Lifestyle The Internet of Things PDF Physical Security SaaS Black Market Fraud Flash Travel Connectivity Current Events Hacking HaaS Staff Mobile Computing Google Drive HIPAA Training Colocation Automobile Two Factor Authentication Miscellaneous Vendor Management Assessment Search Scalability Webinar Television Books Presentation Internet Exlporer IT solutions Public Computer Content 5G Managed Service Provider Workplace Tips IBM Emergency WiFi Internet exploMicrosoft Audiobook Employer Employee Relationship Instant Messaging Experience Customer Relationship Management Files IP Address Advertising Twitter Entertainment Computer Accessories How to Music Customer Service History CrashOverride Office Mobile Office Best Practice Domains Bluetooth Wearable Technology Relocation Transportation Techology Public Speaking Shadow IT USB User Error Humor Benefits Lithium-ion battery Augmented Reality Hybrid Cloud Worker Loyalty Troubleshooting Tech Support Smart Technology Safety Wire Politics Rootkit Hiring/Firing Hosted Solution Quick Tips Competition Fun Video Games Sports

      Mobile? Grab this Article!

      QR-Code dieser Seite