Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage--namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

BitSight found that out of 35,000 companies from over 20 different industries, over 2,000 of them were running on operating systems that are out of date. Furthermore, 8,500 of these companies also ran out-of-date Internet browsers. This particular study focused on organizations using Apple and Microsoft operating systems, as well as the Internet browsers Internet Explorer, Firefox, Safari, and Google Chrome.

It’s clear that organizations that rely on outdated operating systems are three times more likely to suffer from a data breach. Likewise, organizations that use outdated web browsers are twice as likely to suffer from data breaches. While these numbers don’t necessarily show that this outdated software were directly responsible for data breaches, it’s still an important factor that cannot be ignored.

Granted, this shouldn’t be a surprise for any security-minded business professional. It’s been noted for a long time that software, while invaluable, can create any number of issues for organizations. Chief among these is outdated software. As more businesses remain in operation for extended periods of time, they continue to use unsupported software rather than upgrade to more recent versions. Examples of these business software include Windows XP and Windows Vista. What can you do to keep your own business from falling victim to these unfortunate side-effects of using outdated software?

The solution is simple--update your software. This is easier said than done, especially when time and resources are two pertinent issues. The easiest way to get a feel for how your business stands on this issue is to get a network audit from a trusted technology service provider. This will provide an unbiased analysis of how you can shore up weaknesses in your network infrastructure--including outdated software applications. The importance of such an audit cannot be underestimated, especially considering the amount of high-profile threats that like the WannaCry ransomware.

How does your business rate regarding network security? To get an understanding of this important aspect of running your organization, reach out to us at (858) 509-1970.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 July 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Tip of the Week Privacy Best Practices Cloud Technology Software Windows 10 Backup Malware Microsoft Business computing Network Security Office Hosted Solutions Hardware Hackers Smartphones Alert Business Continuity Business Innovation Computer Google Disaster Recovery Managed IT Services Data Internet Small Business Browser Productivity Business Management Productivity Efficiency Quick Tips Android Ransomware Computers Outsourced IT Miscellaneous App Health Social Media Law Enforcement Managed IT Services IT Support Virtualization Email Work/Life Balance Mobile Devices Facebook IT Services Telephone Systems Data Breach Office Tips Smartphone Passwords Password Private Cloud Hacking Google Drive HaaS Wi-Fi Automobile Collaboration Cybercrime History Windows Worker Workplace Tips Money Flexibility How To Mobility Battery Server Managed Service Provider VoIP Social Engineering Bring Your Own Device Chrome Communications Network Automation Saving Money End of Support User Tips Router Upgrade Samsung Remote Computing Public Cloud Holiday Marketing Files The Internet of Things Troubleshooting Cloud Computing Network Congestion Hybrid Cloud Screen Mirroring Smart Technology Cybersecurity Artificial Intelligence FENG Assessment IT Consultant Data Management Apple Cast Two Factor Authentication Settings Risk Management Windows 10 Big Data Television Apps Leadership PDF iPhone Data Storage Rootkit Politics Instant Messaging User Error Relocation OneNote Books Public Computer Electronic Medical Records Employer-Employee Relationship IT Management Training Spam Blocking Monitor Education Save Money Phishing Microsoft Office Information Technology IT Plan Vendor Management Operating System Computing Infrastructure Internet Exlporer Humor Downtime Emergency Unsupported Software Save Time webinar Office 365 Legal Charger Windows 10s Keyboard Data storage Safety Applications Root Cause Analysis Patch Management Software Tips Conferencing Best Practice Cleaning Vulnerability Experience Bandwidth Users Internet exploMicrosoft Spam Scam BYOD Hiring/Firing Emails Content Mobile Device Computer Care Solid State Drive Music Value Search Networking Virtual Reality Advertising Meetings Transportation Mobile Device Management Employer Employee Relationship Audiobook Wireless Video Games Audit Wearable Technology Loyalty How to Current Events Worker Commute Government Data Backup Benefits Gadgets Computer Accessories IT solutions Entertainment Computer Fan USB Techology SaaS Black Market Knowledge Data loss Firewall Bluetooth IT Support Scalability CrashOverride Thank You Congratulations Webinar

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.