Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage--namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

BitSight found that out of 35,000 companies from over 20 different industries, over 2,000 of them were running on operating systems that are out of date. Furthermore, 8,500 of these companies also ran out-of-date Internet browsers. This particular study focused on organizations using Apple and Microsoft operating systems, as well as the Internet browsers Internet Explorer, Firefox, Safari, and Google Chrome.

It’s clear that organizations that rely on outdated operating systems are three times more likely to suffer from a data breach. Likewise, organizations that use outdated web browsers are twice as likely to suffer from data breaches. While these numbers don’t necessarily show that this outdated software were directly responsible for data breaches, it’s still an important factor that cannot be ignored.

Granted, this shouldn’t be a surprise for any security-minded business professional. It’s been noted for a long time that software, while invaluable, can create any number of issues for organizations. Chief among these is outdated software. As more businesses remain in operation for extended periods of time, they continue to use unsupported software rather than upgrade to more recent versions. Examples of these business software include Windows XP and Windows Vista. What can you do to keep your own business from falling victim to these unfortunate side-effects of using outdated software?

The solution is simple--update your software. This is easier said than done, especially when time and resources are two pertinent issues. The easiest way to get a feel for how your business stands on this issue is to get a network audit from a trusted technology service provider. This will provide an unbiased analysis of how you can shore up weaknesses in your network infrastructure--including outdated software applications. The importance of such an audit cannot be underestimated, especially considering the amount of high-profile threats that like the WannaCry ransomware.

How does your business rate regarding network security? To get an understanding of this important aspect of running your organization, reach out to us at (858) 509-1970.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 21 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Tip of the Week Privacy Best Practices Cloud Technology Microsoft Software Windows 10 Backup Business computing Malware Google Hardware Hosted Solutions Hackers Smartphones Alert Data Business Continuity Business Network Security Office Disaster Recovery Computer Internet Small Business Innovation Managed IT Services Business Management Computers Productivity Efficiency Browser Productivity Law Enforcement Android Email Mobile Devices User Tips Miscellaneous App Smartphone Health Cybercrime Virtualization Managed IT Services Social Media Quick Tips IT Services Ransomware Chrome Outsourced IT Facebook Spam Office Tips Hacking Passwords Collaboration Password Private Cloud Work/Life Balance Google Drive How To HaaS VoIP IT Support Telephone Systems Office 365 Data Breach Unsupported Software Patch Management Mobility Managed Service Provider Samsung Social Engineering Communications Value Automation Network Saving Money Mobile Device Management End of Support Remote Computing Upgrade Router Holiday Wi-Fi Automobile Cybersecurity Cloud Computing Windows Worker Workplace Tips Gadgets Windows 10 Public Cloud Marketing Battery Data Storage Server Bring Your Own Device Spam Blocking History Phishing Flexibility Money Applications webinar Windows 10s User Error Best Practice Relocation Windows Server 2008 Managed IT Root Cause Analysis Cleaning Safety Experience Users Monitor Software Tips Conferencing Scam Vulnerability Hiring/Firing Content Mobile Device Windows 7 Botnet Computer Care Bandwidth Music Information Technology Search Virtual Reality BYOD Emails Transportation Solid State Drive Employer Employee Relationship Audiobook Internet Exlporer Video Games Humor Flash Travel Meetings Networking Wearable Technology How to Benefits Worker Commute Data storage Audit Computer Accessories Loyalty Entertainment Redundancy Black Market Data Backup Current Events USB Firewall Physical Security IT solutions Sync Computer Fan Bluetooth SaaS Internet exploMicrosoft Scalability Data loss Knowledge Troubleshooting IT Support Smart Technology Data Security Communication The Internet of Things Advertising Wireless Screen Mirroring Network Congestion Two Factor Authentication Data Management HBO Government Telephony FENG Assessment Risk Management Apps Cast IT Consultant Big Data Settings Techology Outlook Skype Rootkit Television Politics Instant Messaging Leadership Books Electronic Medical Records Files Frequently Asked Questions Start Menu OneNote Training Public Computer Hybrid Cloud Artificial Intelligence Education IT Management Employer-Employee Relationship Save Money Microsoft Office Excel Apple Tools Vendor Management Computing Infrastructure IT Plan Emergency Operating System Save Time Legal Tip of the week iPhone Word Downtime Charger Keyboard PDF Webinar Avoiding Downtime Data Recovery Thank You Congratulations CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...