Windows 7 End of Life Upon Us

Windows 7 End of Life Upon Us

With just days before Microsoft retires two of its most popular operating systems, the quarter of computer users worldwide are at the risk of losing support on January 14, 2020. Therefore, we wanted to take this opportunity to explore the ramifications of an end of support event, and what you can do in response.

If you are currently still using Windows 7, it isn’t as though you won’t be able to use your computer after the January 14. Rather, you will no longer be able to do so securely. The device in question would no longer be receiving the kind of updates and support necessary to protect it from developing threats, and its functionality could degrade as a result. You could also potentially put the safety of your network at risk, if such a device is attached to it.

Granted, there are ways that you might still be able to use devices running out-of-support software (like Windows 7) after the official date passes - especially if you need a particular solution to continue a certain business function. You could simply isolate the machines running the susceptible software from the rest of your network, but you still run the risk of these systems being taken offline through some unpatched vulnerability.

Your best option is to have a plan in place to retire these solutions and continue your operations in some other way.

How You Might Do That

There are several options you might consider:

Bite the Bullet and Upgrade to Windows 10

Honestly, this is probably your simplest route to take. Windows 7 and Windows 10 have similar operating requirements. In fact, Windows 10 relies on surprisingly little to function:

  • Processor - 1 GHZ or faster
  • RAM - 1 GB for 32-bit or 2 GB for 64-bit
  • Hard disk space - 16 GB for 32-bit or 20 GB for 64-bit
  • Graphics card - DirectX 9 or later with WDDM 1.0 driver
  • Display - 800 x 600 resolution

Take note - we said function, not perform. A computer with these specs running Windows 10 simply isn’t going to be very fast, so it makes sense to do more than we’ve listed here. Try using a 2 GHz dual-core processor, installing between 4 and 8 GBs of RAM, and upping the hard drive to 160 GB.

Replace Your Hardware

To be honest, while this is your easiest option, it is effectively guaranteed to be the most expensive as well… but with so little time left, it may be your best option to keep yourself secure. New hardware will come with Windows 10 installed and will receive regular updates - the only downside is it may take some time to configure.

Use ChromeOS

Many businesses are considering the tasks that their employees are responsible for and opting to provide them with Chromebooks rather than Windows workstations. While the cost-effectiveness of this approach can’t be argued, there are other issues to consider. Any line-of-business application would need to be virtualized, and Internet access is a prerequisite to using a Chromebook. While this may be a budget-friendly option on the surface, these hidden costs could cause a rise in your overhead. 

Use a Thin Client Via Virtualization

In some ways similar to using the Chromebook option, you could simply repurpose your old hardware to host virtualized thin clients to accomplish what needs to be done. Of course, with the looming deadline, this may also be a challenge to pull off.

However, Microsoft will still offer the option to use a service called Microsoft 365, which combines Windows 10, Office 365, and a terabyte of OneDrive storage along with the security solutions to protect it all. This cloud-based option is great for teams who largely rely on productivity software and is available on a per-user basis.

Whatever your choice may be, you need to resolve your organization’s Windows 7 problem. To discuss your options in more depth with experienced professionals, reach out to BNMC. We’ll come up with a strategy that works for you. Give us a call at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, January 19 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Privacy User Tips Email Productivity Microsoft Hackers Computer Network Security Software Malware Hosted Solutions Google Business Data Communication Tech Term Small Business IT Services Efficiency Mobile Devices Hardware Workplace Tips IT Support Internet Cloud Computing Ransomware Innovation Managed IT Services Outsourced IT Data Recovery Upgrade Backup Smartphone Android Saving Money Windows Smartphones Facebook Mobile Device Information Users Data Backup Cybersecurity Server Miscellaneous Phishing Office 365 Windows 10 Managed IT Services Social Media Business Management Microsoft Office Business Continuity Browser Internet of Things Data Management communications Windows 10 Vulnerability Word Passwords Remote Monitoring Productivity Gadgets Gmail App Network Encryption VoIP Managed Service Chrome Apps Artificial Intelligence Infrastructure Disaster Recovery Save Money VPN Settings Employer-Employee Relationship Managed Service Provider Virtual Reality Analytics Quick Tips Tip of the week BYOD Website Money Applications IT Support Router Big Data Networking Robot Employee-Employer Relationship Google Drive Company Culture Access Control Automation Content Filtering IT Management Data Security Bandwidth Virtual Private Network Paperless Office Apple Education Development Storage Government YouTube Risk Management Unified Threat Management Computers Hacker Data storage Office Tips Avoiding Downtime Antivirus Display Collaboration Maintenance WiFi The Internet of Things Bring Your Own Device Operating System Business Intelligence Search Monitors LiFi Document Management Vendor Management Social Chromebook Hosted Solution Information Technology Humor Wireless Administration Solid State Drive Downtime Mouse MSP Remote Workers Server Management End of Support Augmented Reality OneNote Business Technology Data Breach Hard Disk Drive Managing Stress Touchscreen Windows 7 Tablet SaaS Printing IT Social Network Password Virtualization HIPAA Data loss Holiday Two-factor Authentication Telephone Systems BDR Mobile Security Managed IT Service Retail desktop Alert Customer Relationship Management Scam Firewall Spam Computing Laptop Outlook Private Cloud Hotspot Internet Exlporer Analysis Students Break Fix Office Samsung Logistics Compliance Human Error Memory Time Management Printer Connectivity Scalability Conferencing Black Friday Uninterrupted Power Supply Budget IT Technicians Optimization Virus Spyware Tech Support Managed Services Utility Computing Servers Google Calendar File Sharing Staff Leominster Updates Emergency Computer Care IBM Typing Modem FinTech Current Events Cybercrime Language Value Mixed Reality Dark Web Social Engineering Best Practice Asset Management Regulations Device Reducing Cost Network Management IoT Migration Consulting Cyber Monday Marketing Mirgation Recycling LED Threats Identity Theft Websites Cookies Laptops Legislation K-12 Schools PowerPoint Training Corporate Profile Cryptocurrency SharePoint Automobile IT solutions Going Green Computing Infrastructure Professional Services Microsoft Excel G Suite Safety Google Docs Memes Social Networking Mobility Batteries Star Wars Managed IT Smart Technology Dell Remote Computing Chatbots eWaste Co-Managed IT Techology Hacks Nanotechnology Software as a Service Managed Services Provider Statistics Network Congestion Cabling Google Wallet Halloween Wearable Technology Network upgrade Onboarding GDPR How To Lenovo WannaCry Bitcoin Downloads Google Maps Alerts USB Slack Hard Disk Drives Mail Merge Blockchain Business Growth Motherboard Cables Print Toner Myths Fraud Cost Management Messaging Shortcut Distributed Denial of Service Writing Legal Identity Continuity Content Huawei VoIP Unified Threat Management Wi-Fi Screen Reader Charging Entertainment Vendor Bluetooth Comparison Unified Communications Drones Scary Stories Smart Office Digital Signage Data Warehouse Firefox Superfish Windows 8 Mobile Management Dark Data Update Running Cable Licensing Dongle Monitoring Solid State Drives Address Permissions Holidays Wires Shortcuts Mobile Device Management Assessment Employee-Employer Relationships Patch Management Deep Learning Distribution Buisness Solar Streaming Processor User Error Digital Payment Virtual Desktop Smart Tech iOS Hybrid Cloud Specifications Disaster Sports Work Troubleshooting Business Analysis Digital Politics Security Cameras Profiles Heating/Cooling Multi-Factor Security Customer Service Cooperation Service Level Agreement Spying National Security Alt Codes Payment Card Voice over Internet Protocol Health Mobile Computing CCTV Webcam Black Market Printers Law Enforcement Inventory Error Electronic Medical Records Notifications Point of Sale Ben McDonald shares Twitter Physical Security Travel Emoji Upgrades Gadget Shadow IT Crowdsourcing Financial Supercomputer Personal Information CrashOverride Botnet Motion Sickness Cortana Staffing 3D Printing Administrator Taxes Web Server what was your? Processors IT Budget Machine Learning GPS Unsupported Software IT Consultant Relocation Cameras Computer Repair Regulation Meetings Tracking Mobile Data Recovery Cleaning How To Work/Life Balance

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3