Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage--namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

BitSight found that out of 35,000 companies from over 20 different industries, over 2,000 of them were running on operating systems that are out of date. Furthermore, 8,500 of these companies also ran out-of-date Internet browsers. This particular study focused on organizations using Apple and Microsoft operating systems, as well as the Internet browsers Internet Explorer, Firefox, Safari, and Google Chrome.

It’s clear that organizations that rely on outdated operating systems are three times more likely to suffer from a data breach. Likewise, organizations that use outdated web browsers are twice as likely to suffer from data breaches. While these numbers don’t necessarily show that this outdated software were directly responsible for data breaches, it’s still an important factor that cannot be ignored.

Granted, this shouldn’t be a surprise for any security-minded business professional. It’s been noted for a long time that software, while invaluable, can create any number of issues for organizations. Chief among these is outdated software. As more businesses remain in operation for extended periods of time, they continue to use unsupported software rather than upgrade to more recent versions. Examples of these business software include Windows XP and Windows Vista. What can you do to keep your own business from falling victim to these unfortunate side-effects of using outdated software?

The solution is simple--update your software. This is easier said than done, especially when time and resources are two pertinent issues. The easiest way to get a feel for how your business stands on this issue is to get a network audit from a trusted technology service provider. This will provide an unbiased analysis of how you can shore up weaknesses in your network infrastructure--including outdated software applications. The importance of such an audit cannot be underestimated, especially considering the amount of high-profile threats that like the WannaCry ransomware.

How does your business rate regarding network security? To get an understanding of this important aspect of running your organization, reach out to us at (858) 509-1970.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Best Practices Technology Cloud Software Business computing Network Security Microsoft Google Hackers Malware Windows 10 Backup Android Business Smartphones Alert Internet Small Business Business Continuity Managed IT Services Innovation Email Hardware Browser Data Ransomware Office Hosted Solutions Computers Disaster Recovery Smartphone VoIP Outsourced IT Business Management User Tips Cloud Computing Efficiency Productivity Computer Chrome Law Enforcement Telephone Systems Mobile Devices Data Backup Productivity Cybercrime Cybersecurity Virtualization How To IT Services Quick Tips Money Social Engineering Communications Miscellaneous Managed IT Services App Collaboration Passwords Health Windows Password Social Media Work/Life Balance Data Protection Phishing Google Drive Bring Your Own Device HaaS Data Breach Artificial Intelligence IT Support Office 365 Vulnerability Spam Mobile Device Management Facebook Tech Term Network Data Recovery Data Security Office Tips Two-factor Authentication Communication Hacking Router Upgrade Holiday Wi-Fi Windows 10 Apps Private Cloud IT Management Employer-Employee Relationship Gadgets Battery Spam Blocking Public Cloud Electronic Medical Records Server IT Plan Marketing Operating System Business Intelligence Word Microsoft Office Unsupported Software History Legal Charger Keyboard Patch Management Flexibility Samsung VPN PDF BYOD Cleaning Scam Mobility Internet of Things Value Mobile Device Managed Service Provider Computer Care Redundancy CES Avoiding Downtime Remote Computing Automation Saving Money End of Support Identity Theft Remote Monitoring Automobile Data Management Data Storage Workplace Tips Worker Update Big Data Comparison Government OneNote Instant Messaging Authentication Amazon Rootkit Politics Books Excel Techology Gmail Specifications Tools Amazon Web Services Training Tip of the week Education Recycling Files Hybrid Cloud Save Money Downtime Digital Signature webinar Online Shopping Vendor Management Emergency Windows Server 2008 Computing Infrastructure Windows 10s eWaste Encryption Safety Millennials Apple Save Time Managed IT Root Cause Analysis Software Tips Conferencing Evernote Windows 7 Applications Criminal Bandwidth Workforce iPhone Botnet Best Practice Experience Emails Wireless Charging Google Docs Relocation Flash Users Solid State Drive User Error Accountants Networking BDR Hiring/Firing Travel Content Meetings Music Search Cortana Monitor Website Transportation Virtual Reality Audit Loyalty Video Games Current Events Information Technology Telecommuting Employer Employee Relationship Audiobook Wearable Technology Physical Security How to IT solutions Google Apps Internet Exlporer Voice over Internet Protocol Humor Benefits Sync Worker Commute Computer Fan Content Management SaaS Practices Knowledge Remote Work Computer Accessories Entertainment Data loss USB Black Market IT Support Workers Data storage Firewall The Internet of Things Blockchain Scalability Hosted Computing Network Congestion Bluetooth Screen Mirroring Troubleshooting HBO Infrastructure Internet exploMicrosoft Multi-Factor Security Smart Technology Telephony FENG HIPAA Assessment Cast Inventory IT Consultant Credit Cards Recovery Outlook Settings Password Manager Television Advertising Trending Two Factor Authentication Skype Human Resources Access Control Leadership Wireless Fraud Risk Management Frequently Asked Questions Business Mangement Public Computer Start Menu Staff CrashOverride Nanotechnology WiFi Webinar Thank You Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...