Windows 7 End of Life Upon Us

Windows 7 End of Life Upon Us

With just days before Microsoft retires two of its most popular operating systems, the quarter of computer users worldwide are at the risk of losing support on January 14, 2020. Therefore, we wanted to take this opportunity to explore the ramifications of an end of support event, and what you can do in response.

If you are currently still using Windows 7, it isn’t as though you won’t be able to use your computer after the January 14. Rather, you will no longer be able to do so securely. The device in question would no longer be receiving the kind of updates and support necessary to protect it from developing threats, and its functionality could degrade as a result. You could also potentially put the safety of your network at risk, if such a device is attached to it.

Granted, there are ways that you might still be able to use devices running out-of-support software (like Windows 7) after the official date passes - especially if you need a particular solution to continue a certain business function. You could simply isolate the machines running the susceptible software from the rest of your network, but you still run the risk of these systems being taken offline through some unpatched vulnerability.

Your best option is to have a plan in place to retire these solutions and continue your operations in some other way.

How You Might Do That

There are several options you might consider:

Bite the Bullet and Upgrade to Windows 10

Honestly, this is probably your simplest route to take. Windows 7 and Windows 10 have similar operating requirements. In fact, Windows 10 relies on surprisingly little to function:

  • Processor - 1 GHZ or faster
  • RAM - 1 GB for 32-bit or 2 GB for 64-bit
  • Hard disk space - 16 GB for 32-bit or 20 GB for 64-bit
  • Graphics card - DirectX 9 or later with WDDM 1.0 driver
  • Display - 800 x 600 resolution

Take note - we said function, not perform. A computer with these specs running Windows 10 simply isn’t going to be very fast, so it makes sense to do more than we’ve listed here. Try using a 2 GHz dual-core processor, installing between 4 and 8 GBs of RAM, and upping the hard drive to 160 GB.

Replace Your Hardware

To be honest, while this is your easiest option, it is effectively guaranteed to be the most expensive as well… but with so little time left, it may be your best option to keep yourself secure. New hardware will come with Windows 10 installed and will receive regular updates - the only downside is it may take some time to configure.

Use ChromeOS

Many businesses are considering the tasks that their employees are responsible for and opting to provide them with Chromebooks rather than Windows workstations. While the cost-effectiveness of this approach can’t be argued, there are other issues to consider. Any line-of-business application would need to be virtualized, and Internet access is a prerequisite to using a Chromebook. While this may be a budget-friendly option on the surface, these hidden costs could cause a rise in your overhead. 

Use a Thin Client Via Virtualization

In some ways similar to using the Chromebook option, you could simply repurpose your old hardware to host virtualized thin clients to accomplish what needs to be done. Of course, with the looming deadline, this may also be a challenge to pull off.

However, Microsoft will still offer the option to use a service called Microsoft 365, which combines Windows 10, Office 365, and a terabyte of OneDrive storage along with the security solutions to protect it all. This cloud-based option is great for teams who largely rely on productivity software and is available on a per-user basis.

Whatever your choice may be, you need to resolve your organization’s Windows 7 problem. To discuss your options in more depth with experienced professionals, reach out to BNMC. We’ll come up with a strategy that works for you. Give us a call at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 31 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Productivity Privacy Cloud User Tips Email Microsoft Network Security Software Computer Hackers Malware Hosted Solutions Google Data Communication Business Small Business Workplace Tips IT Services Efficiency Mobile Devices Hardware Tech Term IT Support Internet Data Recovery Managed IT Services Innovation Cloud Computing Ransomware Backup Smartphone Outsourced IT Windows Smartphones Upgrade Android Data Backup Miscellaneous Mobile Device Users Saving Money Business Continuity Information Facebook Phishing Windows 10 Cybersecurity Server Office 365 Managed IT Services Network Microsoft Office Business Management Browser Social Media Disaster Recovery Windows 10 Passwords Data Management Internet of Things communications Word VoIP Vulnerability Productivity Remote Monitoring Gadgets Gmail App Managed Service Encryption Apps Chrome Artificial Intelligence Quick Tips Infrastructure Website Money IT Support Tip of the week Save Money Employer-Employee Relationship Settings Virtual Reality Access Control Managed Service Provider Analytics VPN Applications Router BYOD Company Culture Employee-Employer Relationship Display Office Tips Collaboration Firewall Maintenance Avoiding Downtime Remote Workers Robot Information Technology Antivirus Development Google Drive Big Data Bandwidth Automation Content Filtering Networking HIPAA BDR Education Apple IT Management Data Security Paperless Office Storage Government Virtual Private Network YouTube Computers Unified Threat Management Hacker Data storage Risk Management desktop Augmented Reality Spam Computing MSP Outlook WiFi Two-factor Authentication Managing Stress Bring Your Own Device Operating System Social OneNote Monitors LiFi Managed IT Service Laptop Vendor Management Chromebook Hosted Solution The Internet of Things Document Management Humor Data Breach Customer Relationship Management Scam Administration Best Practice Windows 7 IT Solid State Drive Mouse Software as a Service Break Fix Social Network Wireless Downtime End of Support Search Marketing Remote Computing Hard Disk Drive Mobile Security Printing Server Management Business Technology SaaS Password Touchscreen Business Intelligence iOS Wi-Fi Virtualization Managed IT Holiday Tablet Data loss Telephone Systems Retail Alert Updates VoIP Unified Threat Management Mirgation Recycling Managed Services Utility Computing Shortcut Distributed Denial of Service Running Cable Politics IoT Digital Payment Buisness Customer Service Shadow IT K-12 Schools Disaster Device Reducing Cost Bluetooth Comparison Work/Life Balance Cookies Digital Alt Codes Mixed Reality Firefox Superfish Professional Services LED Threats Virtual Desktop Office Samsung Social Networking Migration Consulting Address Permissions Sports Private Cloud Memes Computing Infrastructure PowerPoint User Error Chatbots eWaste Budget Laptops Patch Management Tech Support Star Wars Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Nanotechnology Spyware Typing Alerts USB File Sharing Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Onboarding GDPR Time Management Printer Identity Continuity Managed Services Provider Websites Fraud Cost Management COVID-19 Smart Office Print Toner Myths Black Friday Cybercrime Screen Reader Charging Identity Theft Cryptocurrency Slack Hard Disk Drives Licensing Dongle IT solutions Going Green Content Huawei Servers Google Calendar Safety Wires Training Corporate Profile Google Docs Messaging Emergency Holidays Hacks Digital Signage Data Warehouse Network Management Solar G Suite Entertainment Vendor Dark Web Distribution Assessment Automobile Network Congestion Work Dell Google Wallet Shortcuts Mobile Management Cyber Monday Smart Tech Bitcoin Monitoring Solid State Drives Payment Card Cooperation Service Level Agreement Cabling Streaming Processor Legislation Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Google Maps Troubleshooting Business Analysis SharePoint Writing Compliance Legal Hybrid Cloud Microsoft Excel Halloween Logistics Hotspot Internet Exlporer National Security Techology IT Technicians Optimization Unified Communications Drones Security Cameras Profiles Smart Technology Connectivity Windows 8 Spying Inventory Staff Leominster Human Error Memory Statistics Modem FinTech Analysis Students How To Lenovo Dark Data Update Mobile Device Management Virus Downloads Regulations Deep Learning Scalability Conferencing Mail Merge Blockchain Scary Stories Asset Management Language Value Cameras Mobile Data Recovery Meetings How To Tracking Mobile Computing Cleaning Health Black Market CCTV Webcam Law Enforcement Financial Notifications Electronic Medical Records Twitter Physical Security Error Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Personal Information Botnet Cortana Remote Work 3D Printing Regulation Supercomputer CrashOverride Motion Sickness Staffing Processors Taxes Machine Learning Administrator Web Server what was your? Unsupported Software IT Budget GPS Printers IT Consultant Computer Repair Relocation

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3