Alltech IT Solutions Blog

Make Sure You Are Using Supported Software

Make Sure You Are Using Supported Software

Any organization that is running unpatched versions of older Windows operating systems is playing with fire… period. Therefore, it’s your prerogative to make sure you’re adequately protecting your business’ data, and one of the most important ways you can do this is by ensuring your infrastructure is properly maintained.

Why Are Windows Updates So Important?

Windows is a complicated operating system, due in part to the fact that it has to be compatible with the tools that countless organizations work with on a daily basis, as well as the countless features that people have come to expect from business-class workstations. When anything is as popular as Microsoft Windows, you get hackers out there attempting to crack the operating system to discover vulnerabilities. These vulnerabilities are then exploited for a profit. Windows updates are meant to keep this from happening, but they are only effective if the patches and updates are constantly updated.

**Please note that sometimes it isn’t a good idea to just let Windows updates run automatically. Sometimes an update can break something else (like a third-party application or internal workflow). It’s best to test updates before deploying them across your network.

Problems Get Exposed as they are Fixed

Here’s an old school example of a situation that cost companies millions of dollars. Years ago, there were payphones on every street in America. Not that people born after 2000 would have any idea what a payphone is, but at one time, they were extraordinarily popular. Initially, you could be able to fool the payphone into thinking you were putting in coins with what is called a slug. You’d drop some washer in the coin slot, and bingo, you could talk to people without having to have any actual currency.

To combat this, newer payphones were built that had multiple sensors to measure and analyze the coin in real time to determine if it were real. The new payphones didn’t look like the old ones, so people stopped trying to make outgoing calls with washers as currency.

The point here is that the older the payphone was, the more apt it was hacked, and people in the know about these things would target older payphones (with a pocketful of washers) to avoid paying the ridiculous outgoing rate of a phone call.

The same thing happens with old software. When Microsoft retires their software, it exposes that software to hackers, who will be lying in wait to have their way with the network running unpatched and unsupported software.

Older Operating Systems Have the Highest Risk

If you are running a version of Windows (or any software) that has reached the end of its developmental and support life, you are playing with fire.

For example, if you are still running Windows Vista (please, I hope you aren’t) then Microsoft’s mainstream support ended in April 2012. They offered extended support up until April 2017.

Mainstream support is when Microsoft is still providing features, security updates, patching bugs, and more. Extended support is when Microsoft stops adding new features and only provides bug fixes and patches, and only provided that you are on the exact version of the software or operating system that Microsoft says they are supporting.

Back to our example of running Windows Vista (my fingers crossed that this example is purely hypothetical and nobody is still using Vista), it’s pretty clear that Windows Vista was not the shining example of the perfect operating system and that by the end of life there were no flaws whatsoever for hackers to target. If you are running Vista now, you are constantly wide open for any threats that the operating system doesn’t have protections against.

Microsoft’s Upcoming Support Lifestyle End Dates

Here’s a list of the current operating system and server end-of-life dates.

Windows Operating System

Windows XP - April 8, 2014
Windows Vista - April 11, 2017
Windows 7 - January 14, 2020 (It’s coming up!)
Windows 8 - January 10, 2023
Windows 10 - Estimated for October 2025

Microsoft Server Operating Systems

Windows Server 2008 - July 12, 2011
Windows Server 2008 (SP2) - January 14, 2020 (just around the corner!)
Windows Server 2008 R2 - April 9, 2013
Windows Server 2008 R2 (SP1) - January 14, 2020 (It’s almost here!)
Windows Server 2012 - October 10, 2023
Windows Server 2012 R2 - October 10, 2023
Windows Server 2016 - January 11, 2027
Windows Server 2016 Semi-Annual Channel 1709 - Not announced yet
Windows Server 2016 Semi-Annual Channel 1803 - Not announced yet
Lync 2013 - April 11, 2023
Skype for Business 2015 - October 14, 2025

Microsoft SQL Server

SQL Server 2005 (SP4) - April 12, 2016
SQL Server 2008 (SP4) - July 9, 2019 (It’s HERE!)
SQL Server 2008 R2 - July 10, 2012
SQL Server 2008 (SP3) - July 9, 2019 (It’s HERE!)
SQL Server 2012 - January 14, 2014
SQL Server 2012 (SP3) - July 12, 2022
SQL Server 2014 - July 12, 2016
SQL Server 2014 (SP2) - July 9, 2024
SQL Server 2016 - January 9, 2018
SQL Server 2016 (SP1) - July 14, 2026
SQL Server 2017 - October 12, 2026

Exchange Server

Exchange 2007 - January 13, 2009
Exchange 2007 (SP3) - April 11, 2017
Exchange 2010 - October 11, 2010
Exchange 2010 (SP3) - January 14, 2020 (Get ready!)
Exchange 2013 - April 11, 2023
Exchange 2013 (SP1) - April 11, 2023
Exchange 2016 - October 14, 2025


SharePoint 2010 - July 10, 2012
SharePoint 2010 (SP2) - October 13, 2020 (Just over a year away!)
SharePoint 2013 - April 14, 2015
SharePoint 2013 (SP1) - April 11, 2023
SharePoint 2016 - July 14, 2026

Don’t run outdated software and put yourself at risk, call the IT experts at Alltech IT Solutions at 954-628-3770 to upgrade today!

End of Life for SQL Server 2008 and 2008 R2 Coming...
Tip of the Week: Simplify Your Day at Work


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

DDoS Information Software Vulnerability IT Management Politics Gaming Console Processors Efficiency Telephone System Networking Authorization Environment Mobile Devices Wireless Business Management Leadership Workplace Tips Battery Instagram Data PowerPoint IT Services User Tips Managed Service Passwords Wi-Fi Compliance Update Remote Control Blockchain Outlook Downloads Browser Botnet Google Maps Phone System Analysis Certification Spotify G Suite Managed Service Provider Network Security Ink Automobile Video Gadget Live Streaming Autocorrect Telecommute Health Vendor Management Telephone Systems Television Computers Wireless Charging Printing Hosted Solutions Data Breach Safety Remote Monitoring and Management Budget Computer instant Messaging Microsoft Office Movies Hiring/Firing Network IT budget Windows eWaste Document Management Congratulations e-waste Dark Data Chrome IaaS Virus Analytics File Sharing HaaS RAM Knowledge Biometrics Virtualization Eliminating Downtime Voice over IP Microsoft Office 365 Risk Management Business Technology Technology Tips Freedom of Information HP National Security Data Recovery Windows 10 Tip of the week BYOD Innovation Hard Drive Specifications Video Games Profitability Data Management Avoiding Downtime WiFi Medical IT Operating System Net Neutrality Cost Management Digital A.I. Paperless Office Apps HIPAA Machine Learning Value Outsourced IT Hosted Solution Word Router Paste Tech Support Phishing App Printer Spam IT Support Smart Technology Conferencing Business Intelligence Plug-In Files Maintenance Threat Wireless Internet Help Desk Google Drive SSD Mobile Security Security Online Shopping Communication Printer Server Technology Vulnerabilities Remote Computing Email Remote Monitoring Remote Support Gmail Backup Computer Care Productivity Server Sports VoIp Millennials Staff Managed IT Service Paper Entertainment Streaming Media Automation WhatsApp Microsoft Copy iPhone E-Commerce Office Backup and Disaster Recovery Hard Drives Processor Business Quick Tips Hacker Holiday Best Practices Internet of Things Customer Service Twitter Applications Licensing Social Media Two-factor Authentication Internet Cybersecurity Yahoo Data Security Productivity Disaster Recovery Money Cortana Windows XP Tip of the Week Time Management Settings Payment Worker Communications Telecommuting Regulation Storage Business Continuity Healthcare Alerts Authentication Tablet Updates Windows 7 Apple VoIP Thank You Mobile Device Management Edge Benchmarks Microsoft Teams Information Technology Dongle Patch Management Touchscreen Server Management Upgrade BDR Gadgets Hackers Save Money Hardware Bring Your Own Device Users Access Display Office Tips Connectivity Data loss Current Events Sales Hard Disk Drive Chrome OS Data Protection Emergency Google Telephony Retail Collaboration Tech Term Webcam Inventory Emoji Cleaning Windows 10 Search Staffing Cybercrime Privacy Shortcut Website Hacking Password Proactive IT Marketing Saving Money Mobile Device Employees Excel The Internet of Things Hybrid Cloud Company Culture Database Security Cameras Email Management Cryptocurrency Dark Web Government Spyware Cabling Reporting Physical Security Solid State Drive Smartphone Managed IT Services Law Enforcement Workers User Tip News Facebook Cloud Android Virtual Assistant eCommerce Education Voice over Internet Protocol Lead Generation Cloud Computing Samsung Miscellaneous Error Internet Explorer Scam Big Data Synergy OneNote Small Business Laptop Employer-Employee Relationship Unified Threat Management GDPR Personal Information Travel Comparison Mobility Smartphones Ransomware Unified Communications Office 365 Artificial Intelligence Recovery Spam Blocking Training User Security VPN Tech Terms Managed IT Business Computing Managing Stress Electronic Health Records Alert Network Attached Storage Human Resources Employer Employee Relationship WannaCry Trends Tactics Credit Cards Websites How To Content Filtering Managed IT Services Employee-Employer Relationship Cables Work/Life Balance CrashOverride Scheduling Malware Data Backup SaaS Troubleshooting Taskbar Encryption Windows Server 2008 R2 Printers Scalability disposal Access Control Amazon IT Support Bandwidth Wearables Multi-Factor Security Antivirus