Blog - Page 2 of 9 - Cyber One Solutions

ByCOS Webmaster

540 Million Facebook User Records Found On Unprotected Amazon Servers

facebook app database leak

It’s been a bad week for Facebook users.

First, the social media company was caught asking some of its new users to share passwords for their registered email accounts and now…

…the bad week gets worse with a new privacy breach.

More than half a billion records of millions of Facebook users have been found exposed on unprotected Amazon cloud servers.

The exposed datasets do not directly come from Facebook; instead, they were collected and unsecurely stored online by third-party Facebook app developers.

Researchers at the cybersecurity firm UpGuard today revealed that they discovered two datasets—one from a Mexican media company called Cultura Colectiva and another from a Facebook-integrated app called “At the pool”—both left publicly accessible on the Internet.

facebook app database

 

More than 146 GB of data collected by Cultura Colectiva contains over 540 million Facebook user records, including comments, likes, reactions, account names, Facebook user IDs, and more.

The second dataset belonging to “At the Pool” app contains information about users’ friends, likes, groups, and checked-in locations, as well as “names, plaintext passwords and email addresses for 22,000 people.”

Though UpGuard believes the plaintext passwords found in the database were for the At the Pool app, and not for users’ Facebook accounts, given the fact that people frequently re-use the same passwords for multiple apps, many of the leaked passwords could be used to access Facebook accounts.

“As Facebook faces scrutiny over its data stewardship practices, they have made efforts to reduce third-party access. But as these exposures show, the data genie cannot be put back in the bottle. Data about Facebook users have been spread far beyond the bounds of what Facebook can control today,” experts at UpGuard said.

Both datasets were stored in unsecured Amazon S3 buckets, which have now been secured and taken offline after Upguard, Facebook and media contacted Amazon.

This is not the first time third-party companies have collected or misused Facebook data and sometimes leaked it to the public.

The most famous incident is the Cambridge Analytica scandal wherein the political data firm improperly gathered and misused data on 87 million users through a seemingly innocuous quiz app, for which the social media giant is facing £500,000 EU fine.

Though Facebook has since then tightened up its privacy controls ensuring apps use their access appropriately, the social media company is still facing intense pressure and criticism for not doing enough to offer better privacy and security to its 2.3 billion users.

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

 

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.

#company #cyber #cybersecurity #gocyberone #houston #houstonbusiness #htx #informationtechnology #managedsecurity #managedsecurityservicesprovider #managedservices #managedservicesprovider #support #tech #wemakeIThappen

ByCOS Webmaster

5 Essential Cybersecurity Practices for Small Business Owners

5 Essential Cybersecurity Practices for Small Business Owners

We live in a time when major data breaches make news headlines on an almost daily basis.

We know that Yahoo, for example, agreed to a $50 million settlement in relation to a 2013 breach that impacted about 50 million users.

This works out to a measly $1 per user, but the lawsuits against the disgraced internet giant keep piling up. The more scandalous Marriott data breach, which was reported in late 2018, has already attracted estimates of $600 million in losses.

Even your small business is at risk online, but you can use the right cybersecurity precautions to safeguard your assets. Use these essential cybersecurity practices to get started and make your business safer now.

Small business security risks

Airbus and Equifax have also made recent headlines related to cyber attacks and data breaches, but what about small businesses? According to research conducted by the United States Cyber Security Alliance, an alliance between public private companies whose board members include executives from ADP, Comcast, Microsoft, and Google; small business owners have a lot more to lose when it comes to cyber attacks.

The CSA estimates that 60 percent of small business owners will have to call it quits less than a year after being hit with a cyber attack, and chances are that no headlines will be published about them.

The reality is, no business is safe from modern cyber risks and smaller companies really do have a lot more to lose for the following reasons:

Smaller targets are more enticing to certain cybercrime outfits because they are more likely to have inadequate protection.

Unfortunately, law enforcement agencies and prosecutors do not pay much attention to cyber attacks perpetrated against small businesses, even when they feature identity theft.

Pursuant to the above, smaller companies are more vulnerable to fines imposed by regulators should there be compliance issues arising from a data breach.

With all this in mind, information security should be a priority for small business owners who use the internet, especially if they handle customer data, at some point. One example would be ecommerce stores. Information security is complex, but paying attention to the basics can go a long way to make your small business safer.

Here are five essential recommendations:

1. Consulting IT security professionals

A combination of American optimism and early business success can result in overconfidence, and this can be detrimental to information security. A fashion boutique owner who easily gets into ecommerce through a platform such as Shopify may pay too much attention to other business matters, while ignoring potential cyber security risks.

Information security at the small business level is not as easy as launching an ecommerce website using a theme, installing plugins, and learning your way around a content management system (CMS). To this end, you should strongly consider a security audit from an IT security firm, especially if you’re the entire IT department.

For enterprise businesses, third party audits can be expensive – but not for small businesses. You can protect your website from attack using plugins like Wordfence, and monitor your audit log files using something like an activity log plugin. Tools such as these are “on guard” 24/7, monitoring your site and alerting you of anything that looks suspicious. Using tools is not quite the same as hiring a team of security analysts, but it’s a “good enough” solution for most small business owners.

Cyber security

2. Create a security plan and stick to it

A security audit invariably includes an evaluation of existing plans, or the formulation of a new one. Operating a small business without the benefit of a security plan is risky. At the very minimum, the company should identify what information is sensitive, where it is stored, how it should be protected, and what measures should be followed to secure it.

The plan should become company policy, which means that all employees are expected to follow it. Depending on the size of your company and its operations, you may also have to design training sessions to ensure that all staff members are on the same page.

3. Prevent data loss with a backup strategy

The intensity of ransomware attacks – hacks designed to block access to a computer system until a sum of money is paid, like holding a computer to ransom – has not subsided in 2019. In January, one of these attacks resulted in the delay of print editions of major newspapers such as the Baltimore Sun, Los Angeles Times and Chicago Tribune. Things could have been worse for the Tribune publishing empire: the company operates a solid data backup system that enabled it to recover without having to worry about making ransom payments.

Keep in mind that a data backup strategy is only as good as its recovery component, which means that you should test the integrity of the data replication and recovery processes from time to time.

4. Pay attention to endpoint security

What is endpoint security? Every time a client or customer remotely connects to a business network, it creates another path through which the network could be attacked.

Your website content sits in a data center, so it effectively becomes an “endpoint” just like the desktops, laptops, tablets, and smartphones you use to access your content management system (CMS). Any attacks that happen against the data center could compromise your website.

A CMS, such as WordPress, makes it easier to manage a website. With traditional web design and administration, you need to know a bit of coding – HTML and a bit of PHP –  to make web pages look nice. With a CMS, anyone can change the website, add content, and upload pictures, all with the click of a button. Despite its popularity, WordPress has a long list of CMS vulnerabilities and more are discovered each month.

Therefore, you should prioritize secure hosting before looking into any other solutions. Your host is the foundation upon which all else rests. If it’s not secure, then it doesn’t matter what CMS nor plugins you use. Before downloading security plugins or hiring someone to audit your site, it’s important that you choose a hosting company that makes security a top priority.

When evaluating hosting services, take a good look at the default CMS of your hosting company. Platforms like Drupal are known for having great security teams, but Joomla less so. Don’t be shy about paying extra for additional endpoint security if your website directories contain sensitive information.

5. Insurance protection against cybercrime

The online platforms you use to operate and promote your company also serve as launching pads for hackers to ply their wicked trade. It’s virtually impossible to implement security strategies that are 100 percent foolproof.

Since there’s always a risk associated with online business operations, it makes sense for you to think about cyber insurance coverage. The idea is to transfer risk, and cover as much of the expenses arising from cybercrime as possible.

If you would not think of putting a vehicle to work on behalf of your company without a commercial auto insurance, the same line of thinking should be extended to your online operations.

Cyber insurance policies should be evaluated based on how business is conducted within your company. For example, an inbound call center is more vulnerable to social engineering attacks, which means you should prepare your staff adequately. Social engineering attacks are those that target the people who use or manage a system – the “gatekeepers” –  rather than attacking the system directly.

 

Protect your small business against online threats

Small business owners should guard against complacency when it comes to security, lest they become part of the 60 percent who suffer a data breach that shuts down operations permanently.

The good news is that implementing good cybersecurity practices is not a Herculean task. You just have to decide to do it. Now would be a good time.

 

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

 

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.

ByCOS Webmaster

Gain a Deeper Understanding of Your Environment with our IT Assessments

With Cyber One’s comprehensive approach based on industry best practices, we help you win with IT. 

Chances are, your IT environment has developed gradually. Over time, problems can emerge, including performance gaps, redundancies, inefficiencies, and unintended information silos. Eventually, it can be difficult to determine what is and isn’t working. Without the proper perspective, it can be difficult to know where to invest your IT resources.

What exactly IS an IT Assessment? 

An IT Assessment is a comprehensive and thorough review of a company’s environment and technology systems. An effective IT assessment, like the one provided by Cyber One Solutions, will result in a written evaluation and recommendation. IT assessments help organizations like yours, no matter how large or small, get a better return on your IT investment, and, helps keep you winning with IT now and in the future.

We conduct a thorough, in-depth review of all of your critical technology areas, evaluate them against best practices, and provide you with a road map to better leverage your IT as a competitive advantage.

Knowing More Helps You Invest More Wisely

Our IT Assessments make it simple to identify your IT strengths and weaknesses so you can invest more wisely. Our ITA analyzes an expansive range of IT functional areas, including:

  • Data Storage: SAN, permissions, performance, accessibility, availability
  • Server Infrastructure: Warranty/support, performance, capability planning, virtualization, operating systems
  • Network Infrastructure: Power, environment controls, UPS, warranty/support
  • Networking Infrastructure/Carrier Services: ISP, network switching, wireless, cabling and connectivity, LAN/WAN, warranty/support
  • Cloud Services: Compliance, availability, accessibility, service delivery models
  • Business Services/Applications: Collaboration and messaging, financial management, CRM, Active Directory/directory services, business intelligence, file/print sharing
  • Disaster Recover/Business Continuity: RTO and RPO, DR planning/readiness, business and impact analysis, backups
  • Network Security: RTO Password policies, anti-virus, anti-spam, firewall, content filtering, physical security
  • Telephony: All aspects of your telephony solution
  • Risk: Risk identification, risk analysis

Upon completion of the assessment, you receive a detailed report and in-person presentation that outlines the current state of your technology and offers detailed recommendations for improvement.

What are the benefits of a winning IT assessment?

An IT Assessment from COS will help you re-define your business objectives and main focuses. Our IT Assessments will also help you align your IT initiatives with your strategic business plan. In your IT Assessment, we will help you address the following business challenges:

  • Rapid growth and expansion
  • Post-merger integration
  • Regulation and compliance requirements
  • Changes in the competitive landscape
  • Globalization
  • Cost-reduction

These common business challenges, along with many other common business challenges, such as new business processes and changes in management often drive the need for your business to conduct an IT Assessment. At Cyber One, you can rely on us to leverage the appropriate technology to help you improve your business and continue to win with IT.

How Do You Know If Your Organization’s IT is Performing Well?

Often times, IT professionals and businesses of all shapes and sizes become focused on daily business activities and fail to fully understand what it happening with an organization’s IT. However, an IT assessment can help your organization move IT from being reactive to proactive and turn IT into a competitive advantage rather than a detriment. At COS, we are positioned to navigate through the IT Assessment process and help you understand what you can do to improve your company’s IT performance and maintain that winning edge among your competitors. To learn more about our IT Assessments, please call us at (281) 672-8035.

Moving to the Cloud and Need An Assessment?

If you are in the process of moving all or part of your IT assets to the cloud, we can help. With our Cloud Readiness Assessment (CRA), we perform a thorough evaluation of your IT environment, including all applications, security and compliance requirements, disaster recovery and business continuity, and much more.

 

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.

 

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

ByCOS Webmaster

How to Stop Facebook App From Tracking Your Location In the Background

facebook location history background

Every app installed on your smartphone with permission to access location service “can” continually collect your real-time location secretly, even in the background when you do not use them.

Do you know? — Installing the Facebook app on your Android and iOS smartphones automatically gives the social media company your rightful consent to collect the history of your precise location.

If you are not aware, there is a setting called “Location History” in your Facebook app that comes enabled by default, allowing the company to track your every movement even when you are not using the social media app.

So, every time you turn ON location service/GPS setting on your smartphone, let’s say for using Uber app or Google Maps, Facebook starts tracking your location.

Users can manually turn Facebook’s Location History option OFF from the app settings to completely prevent Facebook from collecting your location data, even when the app is in use.

However, unfortunately, disabling Location History would also break some Facebook features that rely on location data like checking into a nearby location, tagging locations in an uploaded photo or while using Nearby Friends, a feature that lets friends share their locations with each other.

facebook location history background

When talking about iOS, Apple offers its users more control over such situations at device level where users don’t want to completely stop an app from using location, allowing them to choose if an app can also access location data in the background or not.

However, people using Facebook on Android have an all-or-nothing option when it comes to location sharing, which means either they have to grant Facebook full access to their location data or completely prevent the social network from seeing your location at all, without any option for accessing your location data only when the app is open.

How to Stop Facebook From Tracking You When Not in Use

Facebook has finally changed this behavior by introducing a new privacy setting to its Android app, giving users more explicit, granular control over background collection of their location data.

Here’s how you can prevent Facebook from tracking your location when the app is not in use:

  • Open the Facebook app on your Android smartphone
  • Go to the Settings menu on the top right corner (looks like this ☰)
  • Tap on Settings & Privacy
  • Choose Privacy Shortcuts
  • Select Manage your location settings
  • Now, toggle “Background Location” to OFF

If you enable this setting, two things will happen—”you would share your location when you weren’t using the app, and you would allow Facebook to store a history of your precise locations.”

“We’re not making any changes to the choices you’ve previously made nor are we collecting any new information as a result of this update,” Facebook’s post reads.

“For people who previously chose to turn their Location History setting ‘on,’ the new background location setting is ‘on.’ For people who had turned Location History ‘off’ – or never turned it on in the first place – the new background location setting is ‘off.'”

With this update, Facebook gives users a dedicated way to choose whether or not to share their location when they are not using the social media app.

iOS users need not worry about such features, as Apple already offers iPhone users an option to block an app from using their location in the background when the app is not open.

If you are an iPhone user and have not already stop Facebook—or any other app—from tracking your location in the background, you can follow these simple steps:

  • Go to Settings
  • Select Privacy
  • Choose “Location Services”
  • If you want to completely stop all apps from tracking you, turn Location Services off. If you want to limit this setting depending on every app, tap each app and choose “Never” or “While Using.”

Make sure apps that don’t require your location, like most games, photo sharing apps and editors, are set to “Never.”

Meanwhile, Facebook is also sending out alerts to both Android and iOS users, asking them to review their location settings.

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

https://t.co/ypvUyREaQg

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.

#houstonbusiness #managedservices #managedservicesprovider #managedsecurity  #managedsecurityservicesprovider #informationtechnology #tech #company #support #wemakeIThappen #gocyberone #cyber #cybersecurity #htx #houston

ByCOS Webmaster

New Phishing Attack That Even Most Vigilant Users Could Fall For!

How do you check if a website asking for your credentials is fake or legit to log in?

By checking if the URL is correct?

By checking if the website address is not a homograph?

By checking if the site is using HTTPS?

Or using software or browser extensions that detect phishing domains?

Well, if you, like most Internet users, are also relying on above basic security practices to spot if that “Facebook.com” or “Google.com” you have been served with is fake or not, you may still fall victim to a newly discovered creative phishing attack and end up in giving away your passwords to hackers.

Antoine Vincent Jebara, co-founder and CEO of password managing software Myki, told The Hacker News that his team recently spotted a new phishing attack campaign “that even the most vigilant users could fall for.”

Vincent found that cybercriminals are distributing links to blogs and services that prompt visitors to first “login using Facebook account” to read an exclusive article or purchase a discounted product.

That’s fine. Login with Facebook or any other social media service is a safe method and is being used by a large number of websites to make it easier for visitors to sign up for a third-party service quickly.

Generally, when you click “log in with Facebook” button available on any website, you either get redirected to facebook.com or are served with facebook.com in a new pop-up browser window, asking you to enter your Facebook credentials to authenticate using OAuth and permitting the service to access your profile’s necessary information.

However, Vincent discovered that the malicious blogs and online services are serving users with a very realistic-looking fake Facebook login prompt after they click the login button which has been designed to capture users’ entered credentials, just like any phishing site.

As shown in the video demonstration Vincent shared with The Hacker News, the fake pop-up login prompt, actually created with HTML and JavaScript, are perfectly reproduced to look and feel exactly like a legitimate browser window—a status bar, navigation bar, shadows and URL to the Facebook website with green lock pad indicating a valid HTTPS.

Moreover, users can also interact with the fake browser window, drag it here-and-there or exit it in the same way any legitimate window acts.

The only way to protect yourself from this type of phishing attack, according to Vincent, “is to actually try to drag the prompt away from the window it is currently displayed in. If dragging it out fails (part of the popup disappears beyond the edge of the window), it’s a definite sign that the popup is fake.”

Besides this, it is always recommended to enable two-factor authentication with every possible service, preventing hackers from accessing your online accounts if they somehow manage to get your credentials.

Phishing schemes are still one of the most severe threats to users as well as companies, and hackers continue to try new and creative ways to trick you into providing them with your sensitive and financial details that they could later use to steal your money or hack into your online accounts.

 

http://ow.ly/a69830nKe90

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.
ByCOS Webmaster

7 Reasons Why Your Organization Needs A Managed Services Partner

Managed Services refer to the practice of outsourcing your company’s IT support and management to improve your organization’s operations. Effectively, this means Managed Services Providers (MSPs), like Cyber One Solutions, would take the place of full-time IT staff that would otherwise be in-house. However, not all businesses have the same IT needs.

So, what can a managed services partnership do for you? Here at COS, we put together seven reasons why you just might want to outsource your IT Services.

1. Reduce Risk

Every business decision, including investments, carries risk. Changes in regulations, technologies, and the market occur at a breakneck speed. MSPs will manage the risk for you and use their industry expertise in areas like security and compliance to minimize your risks.

2. Enhanced Security

Security is a huge focus for any organization. As your organization grows, so do your risks and so does the aftermath of a security breach. MSPs are able to leverage their knowledge and expertise to keep your corporate data safe and sound.

3. Predictable spending

One of the greatest benefits of an MSP is the ability to customize solutions for each client. This prevents you from paying for services that are already taken care of or completely unnecessary for your organization.

4. Lower Costs

The main draw of a managed services model is how much money it can save your business. Not only can an MSP provide a full IT team for a fraction of having one in-house, but it can help prevent expensive network problems.

5. Scalable Solution

As your business grows, the need for different IT skillsets can become a hurdle. With an MSP partnership, it is easy to pick and choose what expertise you need from them so you can add to your service plan as the needs arise.

6. Vendor Management

MSPs deal with software and hardware vendors for you. They’ll handle the complicated and technical conversations, so you don’t have to.

7. Focus on Revenue Generating Tasks

Businesses have limited resources, thus limiting the time and attention of every employee. With an MSP, your organization is able to free up a lot of time and energy for their internal IT staff. This means your IT staff can focus on projects and tasks that they are better suited to handle, while your MSP partner handles the rest.

 

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.

 

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

ByCOS Webmaster

The 20 Internet Giants That Rule the Web

The 20 Internet Giants That Rule the Web (1998-Today)

With each passing year, an increasingly large segment of the population no longer remembers images loading a single pixel row at a time, the earsplitting sound of a 56k modem, or the domination of web portals.

Many of the top websites in 1998 were basically news aggregators or search portals, which are easy concepts to understand. Today, brand touch-points are often spread out between devices (e.g. mobile apps vs. desktop site) and a myriad of services and sub-brands (e.g. Facebook’s constellation of apps). As a result, the world’s biggest websites are complex, interconnected web properties.

Today’s visualization, inspired by an earlier work published by WaPo, looks at which of the internet giants have evolved to stay on top, and which have faded into internet lore.

AMERICA MOVES ONLINE

For millions of curious people the late ’90s, the iconic AOL compact disc was the key that opened the door to the World Wide Web. At its peak, an estimated 35 million people accessed the internet using AOL.

By 1999, the AOL rode the Dot-com bubble to dizzying heights, with a valuation of $222 billion dollars.

AOL’s brand may not carry the caché it once did, but the brand never completely faded into obscurity. The company continually evolved, finally merging with Yahoo after Verizon acquired both of the legendary online brands. Verizon has high hopes for the company – called Oath – to evolve into a “third option” for advertisers and users who are fed up with Google and Facebook.

A CITY OF GIFS AND WEB LOGS

As internet usage began to reach critical mass, web hosts such as AngelFire and GeoCities made it easy for people to create a new home on the Web.

GeoCities, in particular, made a huge impact on the early internet, hosting millions of websites and giving people a way to actually participate in creating online content. If the web host was a physical place, it would’ve been the third largest city in America, just after Los Angeles.

This early online community was at risk of being erased permanently when GeoCities was finally shuttered by Yahoo in 2009, but the nonprofit Internet Archive took special efforts to create a thorough record of GeoCities-hosted pages.

FROM A TO Z

In December of 1998, long before Amazon became the well-oiled retail machine we know today, the company was in the midst of a massive holiday season crunch.

In the real world, employees were pulling long hours and even sleeping in cars to keep the goods flowing, while online, Amazon.com had become one of the biggest sites on the internet as people began to get comfortable with the idea of purchasing goods online. Demand surged as the company began to expand their offering beyond books.

Amazon.com has grown to be the most successful merchant on the Internet.

– New York Times (1998)

DIGITAL MAGAZINE RACK

Meredith – with the possible exception of Oath – may be the most unrecognizable name to many people looking at today’s top 20 list. While Meredith may not be a household name, the company controls many of the country’s most popular magazine brands (People, Sports Illustrated, Health, etc.) including their sizable digital footprints. The company also has a slew of local television networks around the United States.

After its acquisition of Time Inc. in 2017, Meredith became the largest magazine publisher in the world.

“HEY, GOOGLE”

When people have burning questions, they increasingly turn to the internet for answers, but the diversity of sources for those answers is shrinking.

Even as recently as 2013, we can see that About.com, Ask.com, and Answers.com were still among the biggest websites in America. Today though, Google appears to have cemented its status as a universal wellspring of answers.

As smart speakers and voice assistants continue penetrate the market and influence search behavior, Google is unlikely to face any near-term competition from any company not already in the top 20 list.

NEW KIDS ON THE BLOCK

Social media has long since outgrown its fad stage and is now a common digital thread connecting people across the world. While Facebook rapidly jumped into the top 20 by 2007, other social media infused brands took longer to grow into internet giants.

In 2018, Twitter, Snapchat, and Facebook’s umbrella of platforms were are all in the top 20, with LinkedIn and Pinterest not far behind.

NOTE: This ranking uses ComScore data which is focused on the U.S. and looks at unique visitors/viewers.

The 20 Internet Giants That Rule the Web

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

ByCOS Webmaster

Microsoft to end support for Windows 7

A new reminder for those who are still holding on to the Windows 7 operating system—you have one year left until Microsoft ends support for its 9-year-old operating system.

So it’s time for you to upgrade your OS and say goodbye to Windows 7, as its five years of extended support will end on January 14, 2020—that’s precisely one year from today.

After that date, the tech giant will no longer release free security updates, bug fixes and new functionalities for the operating system that’s still widely used by people, which could eventually leave a significant number of users more susceptible to malware attacks.

However, the end of free support doesn’t end Windows 7 support for big business and enterprise customers. As always, Microsoft does make exceptions for certain companies that are willing to pay a lot of money to continue their support.

According to a ‘Death of Windows 7’ report from content delivery firm Kollective, as many as 43% of enterprises are still running the nine-year-old operating system, of which 17% didn’t know when Microsoft’s end of support deadline hit.

Millions of Users Are Still Using Windows 7

Want to know how popular Windows 7 is among users? Even after aggressively pushing Windows 10 installations since its release in 2015, its market share finally managed to overtake the user-favorite Windows 7 just by the end of last year.

Windows 7 was released in 2009 and, according to December 2018 stats from Netmarketshare, is currently running on about 37 percent of the world’s PC fleet, which is far ahead of its radically redesigned successor Windows 8 and 8.1 combined.

Microsoft stopped the mainstream support for Windows 7 in January 2015, but Windows users have continued to receive security updates and patches for known security issues as part of the company’s extended support, which runs for at least five years.

In March 2017, Microsoft also started blocking new security patches and updates for Windows 7 and Windows 8.1 users running the latest processors from Intel, AMD, Qualcomm, and others.

“For Windows 7 to run on any modern silicon, device drivers and firmware need to emulate Windows 7’s expectations for interrupt processing, bus support, and power states- which is challenging for WiFi, graphics, security, and more,” the company said.

“The lifecycle begins when a product is released and ends when it’s no longer supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade or make other changes to your software.”

Besides ending support for Windows 7 next year, Microsoft will also end support for MS Office 2010, Windows Server 2008/2008 R2, SQL Server 2008/2008 R2, Exchange 2010 and Windows Embedded 7 in 2020.

As for Windows 8, the operating system’s extended support is set to end on January 10, 2023.

What Should Affected Windows 7 Users Do?

If you and/or your business are still running Windows 7, you still have one year left to shift to the latest operating system.

Government agencies and big enterprises can still pay for expensive extended support to continue receiving security updates and patches from the company if they need more than a year to migrate to the newer version.

However, regular users should upgrade their operating system immediately to Windows 10 or a Linux distribution, rather than running an unpatched and increasingly vulnerable version of Windows operating system.


Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.

ByCOS Webmaster

Cyber One Solutions Helps Businesses Win!

Are you looking to outsource your IT services? No matter the industry or the size of the technology challenge, Cyber One is dedicated to providing the most effective IT support, strategy & management to businesses large & small.

Contact us today to learn how our managed services can be tailored to meet your business needs. (281) 672-8035 or visit us at https://cyberonesol.com

ByBrian Carrico

We are the Backup and Disaster Recovery experts!

Have you ever deleted a crucial file or lost crucial data? At Cyber One Solutions we have a wealth of experience in backup solutions and disaster recovery — we are the experts in this field. For more information, please get in touch today or visit our website right away. https://www.cyberonesol.com