Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage--namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

BitSight found that out of 35,000 companies from over 20 different industries, over 2,000 of them were running on operating systems that are out of date. Furthermore, 8,500 of these companies also ran out-of-date Internet browsers. This particular study focused on organizations using Apple and Microsoft operating systems, as well as the Internet browsers Internet Explorer, Firefox, Safari, and Google Chrome.

It’s clear that organizations that rely on outdated operating systems are three times more likely to suffer from a data breach. Likewise, organizations that use outdated web browsers are twice as likely to suffer from data breaches. While these numbers don’t necessarily show that this outdated software were directly responsible for data breaches, it’s still an important factor that cannot be ignored.

Granted, this shouldn’t be a surprise for any security-minded business professional. It’s been noted for a long time that software, while invaluable, can create any number of issues for organizations. Chief among these is outdated software. As more businesses remain in operation for extended periods of time, they continue to use unsupported software rather than upgrade to more recent versions. Examples of these business software include Windows XP and Windows Vista. What can you do to keep your own business from falling victim to these unfortunate side-effects of using outdated software?

The solution is simple--update your software. This is easier said than done, especially when time and resources are two pertinent issues. The easiest way to get a feel for how your business stands on this issue is to get a network audit from a trusted technology service provider. This will provide an unbiased analysis of how you can shore up weaknesses in your network infrastructure--including outdated software applications. The importance of such an audit cannot be underestimated, especially considering the amount of high-profile threats that like the WannaCry ransomware.

How does your business rate regarding network security? To get an understanding of this important aspect of running your organization, reach out to us at (858) 509-1970.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 20 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Best Practices Technology Cloud Software Microsoft Business computing Google Windows 10 Backup Hackers Smartphones Malware Business Network Security Android Hardware Managed IT Services Alert Small Business Business Continuity Data Email Office Hosted Solutions Disaster Recovery VoIP Ransomware Outsourced IT Business Management Internet Innovation Computers Browser Computer Smartphone Productivity Efficiency Telephone Systems User Tips Data Backup Law Enforcement How To Chrome Productivity Miscellaneous App IT Services Health Passwords Password Social Media Quick Tips Cloud Computing Managed IT Services Money Mobile Devices Cybersecurity Collaboration Social Engineering Cybercrime Virtualization Communications Windows Work/Life Balance Router Upgrade Two-factor Authentication Bring Your Own Device Spam Office 365 Private Cloud Google Drive HaaS Data Recovery Artificial Intelligence Communication IT Support Hacking Windows 10 Holiday Wi-Fi Facebook Office Tips Data Breach End of Support Unsupported Software Battery Server Vulnerability Samsung Microsoft Office Value Government Charger Keyboard Mobile Device Management Patch Management Redundancy Gadgets Avoiding Downtime Public Cloud Scam Marketing Computer Care Data Security History Flexibility Remote Computing Mobility Data Storage Managed Service Provider Automobile OneNote IT Management Employer-Employee Relationship Spam Blocking Phishing Worker Workplace Tips Network Apps Automation Operating System Word Saving Money webinar Rootkit Google Apps Politics Instant Messaging Windows Server 2008 Voice over Internet Protocol Windows 10s Books Electronic Medical Records Managed IT Remote Work Root Cause Analysis Safety Conferencing Training Workers Internet exploMicrosoft Software Tips Windows 7 Education Save Money Botnet Identity Theft Bandwidth Emails Vendor Management Infrastructure Advertising BYOD Emergency Wireless Flash Multi-Factor Security Computing Infrastructure Solid State Drive Save Time Travel Credit Cards Meetings Legal Networking Password Manager Trending Applications Audit Loyalty Techology Fraud Best Practice Current Events IT solutions Cleaning Experience Physical Security Sync Comparison Users Computer Fan SaaS Hiring/Firing Amazon Content Files Data loss Mobile Device Knowledge Search IT Support Music Hybrid Cloud Transportation Specifications Virtual Reality The Internet of Things Employer Employee Relationship Remote Monitoring Amazon Web Services Audiobook Screen Mirroring Video Games Network Congestion How to Apple Wearable Technology HBO Benefits Telephony Business Intelligence Worker Commute FENG Assessment Computer Accessories Recovery Online Shopping Entertainment Cast IT Consultant Black Market iPhone Settings USB PDF Outlook Firewall Skype Millennials Television Bluetooth Update Evernote User Error Scalability Relocation Leadership Troubleshooting Frequently Asked Questions Smart Technology Start Menu Workforce Monitor Public Computer Wireless Charging Excel Google Docs Information Technology Two Factor Authentication Tools BDR Data Management Cortana Risk Management Internet Exlporer IT Plan Humor Tip of the week Website Big Data Telecommuting Data storage Downtime Thank You Congratulations Webinar Business Mangement Gmail Recycling eWaste WiFi CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...