Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage--namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

BitSight found that out of 35,000 companies from over 20 different industries, over 2,000 of them were running on operating systems that are out of date. Furthermore, 8,500 of these companies also ran out-of-date Internet browsers. This particular study focused on organizations using Apple and Microsoft operating systems, as well as the Internet browsers Internet Explorer, Firefox, Safari, and Google Chrome.

It’s clear that organizations that rely on outdated operating systems are three times more likely to suffer from a data breach. Likewise, organizations that use outdated web browsers are twice as likely to suffer from data breaches. While these numbers don’t necessarily show that this outdated software were directly responsible for data breaches, it’s still an important factor that cannot be ignored.

Granted, this shouldn’t be a surprise for any security-minded business professional. It’s been noted for a long time that software, while invaluable, can create any number of issues for organizations. Chief among these is outdated software. As more businesses remain in operation for extended periods of time, they continue to use unsupported software rather than upgrade to more recent versions. Examples of these business software include Windows XP and Windows Vista. What can you do to keep your own business from falling victim to these unfortunate side-effects of using outdated software?

The solution is simple--update your software. This is easier said than done, especially when time and resources are two pertinent issues. The easiest way to get a feel for how your business stands on this issue is to get a network audit from a trusted technology service provider. This will provide an unbiased analysis of how you can shore up weaknesses in your network infrastructure--including outdated software applications. The importance of such an audit cannot be underestimated, especially considering the amount of high-profile threats that like the WannaCry ransomware.

How does your business rate regarding network security? To get an understanding of this important aspect of running your organization, reach out to us at (858) 509-1970.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Business computing Google Software Microsoft Network Security Backup Malware Hackers Windows 10 Internet Smartphones Android Business Email Browser Hardware Alert Data Small Business Managed IT Services Business Continuity Innovation Hosted Solutions Smartphone Computer VoIP Ransomware Business Management Office Computers Disaster Recovery Cybercrime Productivity Efficiency Outsourced IT Law Enforcement Tech Term User Tips Cloud Computing Cybersecurity Collaboration Virtualization Productivity How To Chrome IT Services Telephone Systems Artificial Intelligence Money Mobile Devices Data Backup Communications Managed IT Services Miscellaneous Router Upgrade App Windows Work/Life Balance Health Passwords Password Social Media Internet of Things Office 365 Quick Tips Facebook Data Recovery Social Engineering Communication Network Wi-Fi Automation Data Protection Office Tips Saving Money Windows 10 Workplace Tips Apps Connectivity Private Cloud Phishing Bring Your Own Device Word Data Breach Google Drive HaaS Vulnerability IT Support Spam Two-factor Authentication Mobile Device Management Data Security Hacking Holiday Automobile End of Support Business Intelligence Data Management Update Worker Data Storage Big Data OneNote IT Management Employer-Employee Relationship Spam Blocking Battery VPN Electronic Medical Records Server Government IT Plan Operating System Gadgets Microsoft Office CES Website Unsupported Software Public Cloud Marketing Managed IT Legal Content Management Charger Keyboard Windows 7 Patch Management Applications Samsung History Bandwidth Cleaning BYOD Scam Value Identity Theft Infrastructure Flexibility Mobile Device Computer Care PDF Redundancy Avoiding Downtime Mobility Managed Service Provider Entertainment Remote Computing Comparison USB Remote Monitoring Specifications HBO Troubleshooting Telephony Smart Technology FENG Data storage Assessment Nanotechnology Amazon Web Services Smart Office Recycling Recovery Cast IT Consultant Settings Digital Signature Outlook Online Shopping Skype Two Factor Authentication Television Smart Tech Document Management eWaste Risk Management Internet exploMicrosoft Leadership Encryption Millennials Frequently Asked Questions Evernote Start Menu Public Computer Instant Messaging Paperless Office Criminal Rootkit Politics Advertising Books Wireless Workforce Excel Wireless Charging Tools Devices Machine Learning Google Docs Training Education Accountants BDR Tip of the week Cortana Save Money Techology Downtime Thought Leadership YouTube Vendor Management webinar Windows Server 2008 Emergency Windows 10s Computing Infrastructure Telecommuting Google Apps Save Time Root Cause Analysis Files Safety Conferencing Voice over Internet Protocol Software Tips Hybrid Cloud Practices Remote Work Workers Botnet Best Practice Addiction Emails Apple Blockchain Experience Flash Solid State Drive Users Hosted Computing Travel Hiring/Firing Meetings Content Networking Cache Search Servers iPhone HIPAA Multi-Factor Security Music Transportation Audit Virtual Reality Loyalty Inventory Credit Cards Password Manager Employer Employee Relationship Audiobook User Error Current Events Video Games Wireless Internet Relocation IT solutions How to HVAC Human Resources Trending Physical Security Wearable Technology Sync Benefits Computer Fan Worker Commute Monitor SaaS Access Control Fraud Business Mangement Computer Accessories Data loss Knowledge Wire Information Technology IT Support Black Market Staff Firewall The Internet of Things Authentication Amazon Humor Gmail Bluetooth Screen Mirroring Internet Exlporer Network Congestion Scalability Sports Password Management NIST Thank You WiFi Congratulations CrashOverride Twitter Company Culture Managing Stress Webinar Enterprise Content Management

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...