Posted on Jun 8, 2016
End-of-Service or End-Of-Life (EOL), is a term applied to hardware or software when a manufacturer stops supporting it with any updates. This can be very problematic since any vulnerabilities that are found (and can subsequently be exploited by hackers) will never be patched. This can cause widespread damage if a software, such as an operating system, becomes End-Of-Life and is still used by companies and enterprises. Fortunately, manufacturers usually announce that they will cease support with enough time in advance for companies to upgrade or replace the End-Of-Life product.
Unfortunately, not all companies react swiftly and EOL products are still in use, increasing the risk of exploitation and a resulting data breach. For example, mainstream support for Windows XP ended in 2011 and extended support ended in 2014. Microsoft continued to support an embeddable version of Windows XP for ATMs until January 2016. However, as Motherboard reported last year, an estimated 35,000 computers on London’s Metropolitan Police network is still using the EOL product.
More recently, the last updates on Internet Explorer version 8, 9, and 10 were released in mid-January. If you or your employees are not using Internet Explorer 11 or Microsoft’s Edge Browser and instead using an unsupported version of the browser, then you and your company’s security is exposed to known vulnerabilities.
If you want to learn about the extent of the End-Of-Life problem, check out our infographic below.
Check out our list of 3 top third party risk management (TPRM) challenges, and the actions you can take to bolster your program. Learn more.
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Read our guide.
Templates and vendor evaluations are needed to level that playing field, in a time efficient and fair way, so that the best vendors are chosen.
Co-founder and CEO, Alex Yampolskiy, speaks about the importance of measuring and acting on key indicators of cybersecurity risk.
You’ve invested in cybersecurity, but are you tracking your efforts? Check out our list of 9 cybersecurity KPIs you should track. Read more.
No waiting, 100% Free
Get your free scorecard and learn how you stack up across 10 risk categories. Answer a few simple questions and we'll instantly send your score to your business email.