Unpatched Windows is Like Leaving Your Car Door Open in a Sketchy Parking Garage at Night with Wads of Cash in the Driver’s Seat

Unpatched Windows is Like Leaving Your Car Door Open in a Sketchy Parking Garage at Night with Wads of Cash in the Driver’s Seat

I recently read a statement from the National Security Agency (NSA) expressing concerns over the risks and vulnerabilities that come with running unpatched versions of older Windows operating systems. First, you know it’s serious if the NSA, an entity in the US who depends on the collection and processing of information, is worried that your personal information is at risk. Second, it’s another in a long line of reasons to not allow your network to fall into such disarray that you can no longer protect it.

Why Are Windows Updates So Important?

Microsoft Windows is complex software. It needs to be. In order to do everything, we need it to do every day, and work with everything we need it to work with, it contains a lot of features and capabilities baked in.

The more complex your software is, the more chances there are that someone out there could find a vulnerability. This happens all the time, and when vulnerabilities are discovered, good software developers will quickly build an update that fixes them before they are exploited.

That’s what Windows updates are. Sure, there are new features being added in many of the updates as well, but the security patches are what is truly critical.

**Please note that sometimes it isn’t a good idea to just let Windows updates run automatically. Sometimes an update can break something else (like a third-party application or internal workflow). It’s best to test updates before deploying them across your network.

Problems Get Exposed as they are Fixed

Let me give you a more old-school example. Way back in the day, you used to be able to ‘hack’ a vending machine with fake coins called slugs. To combat this, new vending machines were created that had multiple sensors to measure and analyze the coin in real time to determine if it were real. When these new machines were released, they were also might newer looking than the old school, hackable vending machines. Word got out about how easily the older machines could accept a slug and encouraged people to seek them out to get free beverages.

What can we take away from this?

  • If you owned an old vending machine, you were at risk of being hacked.
  • Older vending machines were targeted by people who knew that they were hackable, as opposed to the new vending machines that weren’t as easily exploitable.
  • Risk increased as time went on if you owned an older vending machine.
  • How often do you see vending machines that even take coins these days? I’m dating myself.

When Microsoft releases security updates, this exposes the vulnerability to the world. This includes hackers. This means everyone is on bought time once an update comes out, because hackers know that not everyone will update.

Older Operating Systems Have the Highest Risk

If you are running a version of Windows (or any software) that has reached the end of its developmental and support life, you are playing with fire.

For example, if you are still running Windows Vista (please, I hope you aren’t) then Microsoft’s mainstream support ended in April 2012. They offered extended support up until April 2017.

Mainstream support is when Microsoft is still providing features, security updates, patching bugs, and more. Extended support is when Microsoft stops adding new features and only provides bug fixes and patches, and only provided that you are on the exact version of the software or operating system that Microsoft says they are supporting.

Back to our example of running Windows Vista (my fingers crossed that this example is purely hypothetical and nobody is still using Vista), it’s pretty clear that Windows Vista was not the shining example of the perfect operating system and that by the end of life there were no flaws whatsoever for hackers to target. If you are running Vista now, you are constantly wide open for any threats that the operating system doesn’t have protections against.

Microsoft’s Upcoming Support Lifestyle End Dates

Here’s a list of the current operating system and server end-of-life dates.

Windows Operating System

Windows XP - April 8, 2014
Windows Vista - April 11, 2017
Windows 7 - January 14, 2020 (It’s coming up!)
Windows 8 - January 10, 2023
Windows 10 - Estimated for October 2025

Microsoft Server Operating Systems

Windows Server 2008 - July 12, 2011
Windows Server 2008 (SP2) - January 14, 2020 (just around the corner!)
Windows Server 2008 R2 - April 9, 2013
Windows Server 2008 R2 (SP1) - January 14, 2020 (It’s almost here!)
Windows Server 2012 - October 10, 2023
Windows Server 2012 R2 - October 10, 2023
Windows Server 2016 - January 11, 2027
Windows Server 2016 Semi-Annual Channel 1709 - Not announced yet
Windows Server 2016 Semi-Annual Channel 1803 - Not announced yet
Lync 2013 - April 11, 2023
Skype for Business 2015 - October 14, 2025

Microsoft SQL Server

SQL Server 2005 (SP4) - April 12, 2016
SQL Server 2008 (SP4) - July 9, 2019 (It’s HERE!)
SQL Server 2008 R2 - July 10, 2012
SQL Server 2008 (SP3) - July 9, 2019 (It’s HERE!)
SQL Server 2012 - January 14, 2014
SQL Server 2012 (SP3) - July 12, 2022
SQL Server 2014 - July 12, 2016
SQL Server 2014 (SP2) - July 9, 2024
SQL Server 2016 - January 9, 2018
SQL Server 2016 (SP1) - July 14, 2026
SQL Server 2017 - October 12, 2026

Exchange Server

Exchange 2007 - January 13, 2009
Exchange 2007 (SP3) - April 11, 2017
Exchange 2010 - October 11, 2010
Exchange 2010 (SP3) - January 14, 2020 (Get ready!)
Exchange 2013 - April 11, 2023
Exchange 2013 (SP1) - April 11, 2023
Exchange 2016 - October 14, 2025


SharePoint 2010 - July 10, 2012
SharePoint 2010 (SP2) - October 13, 2020 (Just over a year away!)
SharePoint 2013 - April 14, 2015
SharePoint 2013 (SP1) - April 11, 2023
SharePoint 2016 - July 14, 2026

If you are running outdated software, you are putting yourself, your business, your employees, and your clients at risk. Want help planning your next upgrade? Reach out to BNMC at 978-482-2020 to get an idea of what it will take.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 20 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Business Computing Privacy User Tips Microsoft Network Security Software Google Productivity Malware Hackers Business Hosted Solutions Computer Tech Term Communication Data Internet Ransomware Mobile Devices Small Business IT Services Efficiency Cloud Computing Hardware Smartphone Data Recovery Workplace Tips IT Support Backup Saving Money Innovation Android Managed IT Services Information Business Continuity Microsoft Office Windows Users Office 365 Managed IT Services Social Media Browser Windows 10 Data Backup Internet of Things Mobile Device Data Management Upgrade Business Management Windows 10 App Gmail Outsourced IT Word Vulnerability Passwords Productivity Cybersecurity Server Facebook Phishing Artificial Intelligence Network Disaster Recovery Encryption Remote Monitoring Smartphones Chrome Miscellaneous communications Website BYOD Tip of the week IT Support Money Applications Employer-Employee Relationship VoIP Save Money Gadgets Managed Service Provider Virtual Reality Analytics Managed Service Infrastructure Government Risk Management Development Maintenance Hacker Data storage Office Tips Display Antivirus Big Data Router Robot VPN Google Drive Access Control Settings Content Filtering IT Management Bandwidth Automation Paperless Office Company Culture Apps Employee-Employer Relationship Apple Education YouTube Unified Threat Management OneNote SaaS Telephone Systems Printing desktop Holiday Computers Virtualization Collaboration Firewall Two-factor Authentication HIPAA Avoiding Downtime Retail Alert Document Management Scam Laptop Outlook The Internet of Things Spam Computing Mobile Security Bring Your Own Device Operating System Wireless WiFi Solid State Drive LiFi Vendor Management Networking Monitors Downtime Business Intelligence Chromebook Hosted Solution Administration Hard Disk Drive Mouse Data Security Business Technology End of Support Server Management Virtual Private Network Touchscreen Augmented Reality Quick Tips Data loss Storage Managing Stress Tablet PowerPoint Mail Merge Blockchain Business Growth Chatbots eWaste Laptops Downloads Star Wars Shortcut Distributed Denial of Service Scary Stories Legal Wearable Technology Network upgrade Wi-Fi Digital Payment Mobility VoIP Unified Threat Management Password Nanotechnology Writing Data Breach Alerts USB Digital Co-Managed IT Firefox Superfish Windows 8 Motherboard Cables Disaster Bluetooth Comparison Running Cable Unified Communications Drones Onboarding GDPR Address Permissions Buisness Identity Continuity Dark Data Update Software as a Service Fraud Cost Management Patch Management Managed IT Service Sports Deep Learning Smart Office Print Toner User Error Virtual Desktop Mobile Device Management Screen Reader Charging Slack Hard Disk Drives Licensing Dongle Politics Spyware Content Customer Relationship Management Wires Uninterrupted Power Supply Messaging Specifications Computer Care IBM Digital Signage Data Warehouse Alt Codes Solar Customer Service File Sharing Entertainment Heating/Cooling Multi-Factor Security Assessment Break Fix Work Private Cloud Shortcuts Time Management Printer Smart Tech Office Samsung Monitoring Solid State Drives Budget Cooperation Service Level Agreement Identity Theft Tech Support Streaming Social Voice over Internet Protocol Employee-Employer Relationships Search Black Friday Training Corporate Profile Troubleshooting Business Analysis Emergency Typing Humor Compliance iOS Servers Google Calendar Cybercrime Information Technology Hotspot Internet Exlporer Spying National Security Dark Web Marketing Best Practice IT Technicians Optimization Automobile Security Cameras Network Management Current Events Connectivity Social Engineering G Suite Cyber Monday Staff Leominster Websites Human Error Modem FinTech Dell Analysis Students WannaCry Cryptocurrency Regulations Cabling Scalability Legislation Language Value Updates Microsoft Excel Google Docs Mirgation Recycling Google Maps Managed Services SharePoint IT solutions Going Green IoT Safety Managed IT Smart Technology Halloween K-12 Schools Device Techology Hacks Cookies MSP Remote Computing Mixed Reality Computing Infrastructure Professional Services LED How To Lenovo Bitcoin Social Networking Network Congestion Migration Statistics Google Wallet IT Consultant Machine Learning Cameras Processors Unsupported Software Tracking Meetings Windows 7 Cleaning Computer Repair Relocation CCTV Mobile Data BDR Webcam How To Work/Life Balance Recovery Error Health Mobile Computing Regulation Point of Sale Black Market Ben McDonald shares Law Enforcement Travel Electronic Medical Records Notifications Physical Security Supercomputer CrashOverride Twitter Upgrades Staffing Gadget Printers Motion Sickness Emoji Administrator Taxes Crowdsourcing Personal Information IT Budget Botnet Web Server what was your? 3D Printing GPS Cortana

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3