(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage--namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

BitSight found that out of 35,000 companies from over 20 different industries, over 2,000 of them were running on operating systems that are out of date. Furthermore, 8,500 of these companies also ran out-of-date Internet browsers. This particular study focused on organizations using Apple and Microsoft operating systems, as well as the Internet browsers Internet Explorer, Firefox, Safari, and Google Chrome.

It’s clear that organizations that rely on outdated operating systems are three times more likely to suffer from a data breach. Likewise, organizations that use outdated web browsers are twice as likely to suffer from data breaches. While these numbers don’t necessarily show that this outdated software were directly responsible for data breaches, it’s still an important factor that cannot be ignored.

Granted, this shouldn’t be a surprise for any security-minded business professional. It’s been noted for a long time that software, while invaluable, can create any number of issues for organizations. Chief among these is outdated software. As more businesses remain in operation for extended periods of time, they continue to use unsupported software rather than upgrade to more recent versions. Examples of these business software include Windows XP and Windows Vista. What can you do to keep your own business from falling victim to these unfortunate side-effects of using outdated software?

The solution is simple--update your software. This is easier said than done, especially when time and resources are two pertinent issues. The easiest way to get a feel for how your business stands on this issue is to get a network audit from a trusted technology service provider. This will provide an unbiased analysis of how you can shore up weaknesses in your network infrastructure--including outdated software applications. The importance of such an audit cannot be underestimated, especially considering the amount of high-profile threats that like the WannaCry ransomware.

How does your business rate regarding network security? To get an understanding of this important aspect of running your organization, reach out to us at 407-478-6600.

4 Ways to Secure Your Business and Ensure Complian...
Are You Making Your Business Vulnerable to Project...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Cloud Managed IT Services Privacy Best Practices Hackers Business Computing Network Security Malware Microsoft Software Backup Business Continuity Technology IT Support VoIP Google Saving Money Outsourced IT Small Business Hosted Solutions Mobile Devices Data Backup Data Cybersecurity Efficiency Hardware Disaster Recovery Email Avoiding Downtime User Tips Managed IT Smartphones Business Communication Android Managed IT Services Ransomware Law Enforcement App Spam BYOD Cybercrime How To Innovation Internet Phishing Mobility Chrome Collaboration Proactive IT Mobile Device Management IT Services Router Communications Apps Social Engineering Wi-Fi Business Owner Gadgets Bring Your Own Device Windows 10 Two-factor Authentication Unsupported Software Solid State Drive Budget Word Office 365 Social Media Cloud Computing Save Money Alert Spam Blocking Virtualization Compliance Flexibility Passwords Data Security Operating System Server Productivity Redundancy Data Recovery Business Management Data Breach Data Storage Information Technology Network Telephone Systems Browser Remote Monitoring Firewall Money Computer Computers Worker Commute Voice over Internet Protocol IT Management Knowledge Wireless Emails Hard Drives Content Filtering Windows Server 2008 FENG Samsung Remote Computing Professional Services Multi-Factor Security IT Plan Network Congestion Netflix Windows 7 Value Tools Microsoft Office Document Management Trending Users IT Consultant Settings Patch Management Regulations OneNote Computing Infrastructure SaaS Recovery Save Time Lifestyle Software Tips Leadership Employer-Employee Relationship Scam Wireless Technology HaaS Servers Downtime End of Support Botnet Mobile Computing Physical Security Flash Root Cause Analysis Private Cloud Internet of Things Black Market Travel Hacking Data Protection Artificial Intelligence webinar Website Meetings Public Cloud Battery Productivity Work/Life Balance Marketing HBO Facebook Conferencing Windows 10s Windows Sync Software as a Service Cast Data loss Google Drive Education Holiday Outlook Smartphone IT Support Vulnerability Technology Tips The Internet of Things Telephony Government Screen Mirroring Bandwidth Hacker Applications Frequently Asked Questions Audit Upgrade Skype Update Business Intelligence Networking Workers Excel BDR Health Unified Threat Management Windows 10 Start Menu Virtual Reality Google Docs Data Warehousing Current Events Tip of the week Office Tips Computer Fan Computer Care Mobile

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Blog Archive