(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage--namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

BitSight found that out of 35,000 companies from over 20 different industries, over 2,000 of them were running on operating systems that are out of date. Furthermore, 8,500 of these companies also ran out-of-date Internet browsers. This particular study focused on organizations using Apple and Microsoft operating systems, as well as the Internet browsers Internet Explorer, Firefox, Safari, and Google Chrome.

It’s clear that organizations that rely on outdated operating systems are three times more likely to suffer from a data breach. Likewise, organizations that use outdated web browsers are twice as likely to suffer from data breaches. While these numbers don’t necessarily show that this outdated software were directly responsible for data breaches, it’s still an important factor that cannot be ignored.

Granted, this shouldn’t be a surprise for any security-minded business professional. It’s been noted for a long time that software, while invaluable, can create any number of issues for organizations. Chief among these is outdated software. As more businesses remain in operation for extended periods of time, they continue to use unsupported software rather than upgrade to more recent versions. Examples of these business software include Windows XP and Windows Vista. What can you do to keep your own business from falling victim to these unfortunate side-effects of using outdated software?

The solution is simple--update your software. This is easier said than done, especially when time and resources are two pertinent issues. The easiest way to get a feel for how your business stands on this issue is to get a network audit from a trusted technology service provider. This will provide an unbiased analysis of how you can shore up weaknesses in your network infrastructure--including outdated software applications. The importance of such an audit cannot be underestimated, especially considering the amount of high-profile threats that like the WannaCry ransomware.

How does your business rate regarding network security? To get an understanding of this important aspect of running your organization, reach out to us at 407-478-6600.

4 Ways to Secure Your Business and Ensure Complian...
Are You Making Your Business Vulnerable to Project...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 26 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Cloud Best Practices Managed IT Services Privacy Business Computing Network Security Backup Technology Hackers Microsoft Malware Saving Money IT Support Business Continuity Software Hosted Solutions Mobile Devices Outsourced IT Data Hardware Email Small Business Disaster Recovery Efficiency Managed IT Services Cybersecurity Managed IT Data Backup Law Enforcement Google VoIP Cybercrime Avoiding Downtime Mobile Device Management Spam Android Smartphones User Tips How To Innovation Business Chrome Internet App BYOD IT Services Productivity Business Management Data Storage Solid State Drive Save Money Flexibility Proactive IT Computer Mobility Alert Virtualization Collaboration Windows 10 Office 365 Server Budget Gadgets Firewall Cloud Computing Unsupported Software Phishing Spam Blocking Ransomware Information Technology Social Media Network Compliance Data Breach Computers Router Communication Passwords Data Security Business Owner Money Telephony Vulnerability Bandwidth Remote Computing Communications Hacker Screen Mirroring Marketing HBO Document Management Hard Drives Social Engineering Skype The Internet of Things Audit Cast Networking Outlook Workers Save Time HaaS Start Menu Windows 10 BDR Current Events Browser Tip of the week Frequently Asked Questions Computing Infrastructure Mobile Computer Fan Business Intelligence Knowledge Black Market Wireless Employer-Employee Relationship Windows Server 2008 Excel Emails Hacking Unified Threat Management End of Support Professional Services FENG Data Warehousing Network Congestion Battery Wi-Fi Windows 7 Netflix Windows Samsung Private Cloud Tools Two-factor Authentication IT Management IT Consultant Education Facebook Regulations Apps Settings Telephone Systems Value Public Cloud Word OneNote IT Plan Leadership Applications Smartphone Servers Google Drive Botnet Downtime Users Technology Tips Flash Bring Your Own Device Internet of Things Travel Root Cause Analysis Software Tips webinar Virtual Reality Redundancy Wireless Technology Operating System Patch Management Data Recovery Meetings Physical Security Conferencing Worker Commute Health Sync Windows 10s Data loss IT Support

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Blog Archive