鶹ý

Spotlight of the week: Outdated and Unpatched devices risk

October 17, 2024

Why outdated or unpatched devices are risky?

Devices that are end of life, aka no longer supported by the manufacturer or service providers, no longer receive firmware updates and therefore are not suitable for current times where vulnerabilities can be exploited without necessary security updates. The same is with the outdated operating systems, the older they get, the less updates and security fixes they receive. A computer with no updates is a target to be exploited due to its current weaknesses.

Alarming breach from the past. Be aware. Be cybersmart.

Windows device

A major security incident (malware that steals your data and encrypts your computer demanding a ransom) in the year 2017 impacted more than 200,000 computers across 150+ countries across the globe.  The cause of the widespread attack was unpatched windows systems.

The security flaw on the windows OS called “” was discovered by the US National security Agency (NDA). This security flaw and the exploit was stolen from the NSA by a hacker group and released to the public. This led to WannaCry ransomware spread across the computers, almost like a thief walking into houses with unlocked doors. 

Mac device

In August 2024, researchers discovered devices that could allow an attacker to access microphones and cameras without the user’s knowledge. Through these flaws hackers could secretly record video or audio.

What are the takeaways?

The lesson is clear: keeping devices and software up to date is crucial. There are vulnerabilities discovered by security researchers and outdated systems remain at a high risk of being compromised. 

Security updates are released by the manufacturers However, if your device is not up to date you are at a much higher risk of a hacker breaking into your system.

What can you do?

  • Check your device now to ensure your and are up to date.
  • If you are running Windows 10, Education Commons will reach out to you to schedule an upgrade in the next two weeks.
  • Ensure all third-party applications on your devices are from trusted sources and up to date. If you are not sure of the third-party application that you’d like to use, contact Education Commons for a security risk assessment.
Share this Article: