Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage--namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

BitSight found that out of 35,000 companies from over 20 different industries, over 2,000 of them were running on operating systems that are out of date. Furthermore, 8,500 of these companies also ran out-of-date Internet browsers. This particular study focused on organizations using Apple and Microsoft operating systems, as well as the Internet browsers Internet Explorer, Firefox, Safari, and Google Chrome.

It’s clear that organizations that rely on outdated operating systems are three times more likely to suffer from a data breach. Likewise, organizations that use outdated web browsers are twice as likely to suffer from data breaches. While these numbers don’t necessarily show that this outdated software were directly responsible for data breaches, it’s still an important factor that cannot be ignored.

Granted, this shouldn’t be a surprise for any security-minded business professional. It’s been noted for a long time that software, while invaluable, can create any number of issues for organizations. Chief among these is outdated software. As more businesses remain in operation for extended periods of time, they continue to use unsupported software rather than upgrade to more recent versions. Examples of these business software include Windows XP and Windows Vista. What can you do to keep your own business from falling victim to these unfortunate side-effects of using outdated software?

The solution is simple--update your software. This is easier said than done, especially when time and resources are two pertinent issues. The easiest way to get a feel for how your business stands on this issue is to get a network audit from a trusted technology service provider. This will provide an unbiased analysis of how you can shore up weaknesses in your network infrastructure--including outdated software applications. The importance of such an audit cannot be underestimated, especially considering the amount of high-profile threats that like the WannaCry ransomware.

How does your business rate regarding network security? To get an understanding of this important aspect of running your organization, reach out to us at (858) 509-1970.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 20 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Best Practices Cloud Technology Software Microsoft Google Business computing Windows 10 Backup Hackers Smartphones Malware Hardware Business Continuity Business Network Security Office Hosted Solutions Managed IT Services Alert Data Small Business Browser Computer Disaster Recovery Android Ransomware Internet Innovation Computers Productivity VoIP Outsourced IT Productivity Efficiency Business Management User Tips Law Enforcement Email Mobile Devices Cybersecurity Collaboration Cybercrime Virtualization Managed IT Services IT Services Miscellaneous App Smartphone Telephone Systems Health Passwords Social Media Chrome Quick Tips Wi-Fi Money Data Backup Facebook Social Engineering Work/Life Balance Communications Communication Office Tips Bring Your Own Device Upgrade Router How To Office 365 Password Private Cloud Data Breach Google Drive HaaS IT Support Spam Hacking Flexibility Automobile Mobile Device Management Redundancy Mobility Avoiding Downtime Managed Service Provider Windows Worker Workplace Tips Apps Data Security Cloud Computing Battery Automation Server Network Saving Money End of Support Microsoft Office Windows 10 Data Storage Patch Management Spam Blocking Phishing Government Scam Operating System Gadgets Word Computer Care Public Cloud Unsupported Software Marketing Artificial Intelligence Samsung Remote Computing History Holiday Value Specifications Travel Meetings Troubleshooting Networking iPhone Smart Technology PDF Audit Loyalty User Error Relocation Current Events Two Factor Authentication IT solutions Data Management Physical Security Sync Monitor Computer Fan Risk Management SaaS Data Recovery Data loss Big Data Knowledge IT Support Information Technology Rootkit The Internet of Things Politics Instant Messaging Remote Monitoring Internet Exlporer Screen Mirroring Humor Books Network Congestion Electronic Medical Records HBO Google Docs Telephony Data storage Training FENG Assessment Education Recovery Cast IT Consultant Outlook Save Money Settings Website Skype Vendor Management Television Leadership Computing Infrastructure Update Internet exploMicrosoft Emergency Frequently Asked Questions Save Time Legal Voice over Internet Protocol Start Menu Charger OneNote Keyboard Public Computer Employer-Employee Relationship Applications Advertising IT Management Excel Best Practice Wireless Two-factor Authentication Tools Cleaning Experience Users IT Plan Tip of the week Hiring/Firing Content Mobile Device Multi-Factor Security Techology Downtime Music Search Transportation webinar Virtual Reality Windows Server 2008 Employer Employee Relationship Windows 10s Audiobook Video Games How to Trending Managed IT Files Root Cause Analysis Wearable Technology Safety Benefits Conferencing Worker Commute Hybrid Cloud Software Tips Windows 7 Computer Accessories Vulnerability Entertainment Black Market Comparison Botnet USB Bandwidth Apple Firewall Emails BYOD Flash Bluetooth Solid State Drive Scalability Webinar Business Intelligence WiFi Thank You Congratulations CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...