Search
Close this search box.

Latest threat report highlights Windows 7 vulnerabilities

Table of Contents

[fusion_builder_container type=”flex” hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” border_style=”solid”][fusion_builder_row][fusion_builder_column type=”1_1″ type=”1_1″ layout=”1_1″ background_position=”left top” border_style=”solid” border_position=”all” spacing=”yes” background_repeat=”no-repeat” margin_top=”0px” margin_bottom=”0px” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” last=”true” hover_type=”none” first=”true” min_height=”” link=””][fusion_text rule_style=”default” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sticky_display=”normal,sticky” text_transform=”none” animation_direction=”left” animation_speed=”0.3″]

Windows 7 is becoming an increasingly less secure operating system to do business on, according to a recent threat report.

Webroot recently published its bi-annual Threat Report for the first half of 2019.

These statistics demonstrate an escalation in the tactics of cyber criminals. For example, malware that can evade signature-based antivirus security is now the norm, and phishing remains an increasingly lucrative tactic.

Windows 7 – Time to Upgrade?

We recently wrote that Windows 7 Professional is receiving extended support through an additional 3 years of security updates.

Despite this, Neuways highly recommends upgrading to Windows 10 in order to ensure you’re working on the most secure version of Windows. This is supported by Webroot’s latest Threat Report, which found that older operating systems are increasingly vulnerable to exploits.

Though Windows 7 has always been a much-loved and reliable platform, upgrading is becoming more and more essential.

Why Upgrade to Windows 10?

  • Windows 10 is the most secure, functional, and productive version of Windows desktop.
  • Full compatibility with Office 365 applications, platforms, and security mechanisms.
  • Windows 10 allows for the broadest compatibility with leading 3rd party programs and applications.
  • Windows 10 offers a best-in-class laptop and mobile experience.

The reason that 2017’s WannaCry cyber attack was so devastating was because of the large number of unpatched devices on older systems (many pre-Windows 7). But with the Windows 7 operating system seeing a massive 71% spike in malware in the first half of 2019, now is the time to make ensure that you’re working on the latest version of Windows 10.

Changing Nature of Malware

Antivirus security used to work primarily by identifying threats based on their ‘definition’, with the definition index updated regularly. This is known as signature-based detection and is based on the principle of identifying the threat and adding information about it to a knowledge database.

This means that if an incoming threat meets the criteria, or ‘definition’, then it will be flagged.

However, recent reports (including Webroot’s) have found that malware is becoming increasingly polymorphic. The means that, much like a medical virus, malware is evolving to outpace the antidote (antivirus security, to continue the medical comparison…).If the malware can outstrip the ‘definition’ then it’s free to implant itself into a victim’s device. Signature-based detection is therefore no longer good enough to keep up with the range of threats arrayed against businesses.

Polymorphic malware is now the norm, with 95% of malware detected identified as being unique to each individual PC. Ultimately, this means that businesses using standard antivirus security will be unable to detect 95% of malware!

This means you need a modern endpoint security solution that responds proactively to threats with behavioural analysis and machine learning.

Phishing in Plain Sight

Another observation in the report is that phishing remains a lucrative weapon of choice for cyber criminals.

Why is this?

Well, it’s simple to set up, easy to conduct, and at least 1 in 10 people fall for a phishing email.

The report found that a staggering 29% of phishing URLs are HTTPS certified. This means that almost one third of websites designed to steal your personal details (including banking and account credentials) possess a certificate denoting secure data encryption.

Looking for a HTTPS logo has often been a cyber security best practice. However, it does not guarantee the authenticity of a website. In fact, if you submit your details to a HTTPS-enabled phishing website, all it means is that your information has been sent securely to the criminal operating the website!

Remarkably, another finding in the report was that 1 in 4 of malicious URLs were found on trusted, legitimate websites.

This is because criminals know they can rely on the trust of users when visiting particular websites. With this in mind, criminals will sometimes hijack individual pages on trusted websites. This allows them to host malicious URLs that direct the victim to a less secure location on the web.

Any questions about endpoint security or an upgrade to Windows 10? Give us a call on 01283 753 333
or email hello@neuways.com.

[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]

Want to keep up with our blog?

Get our most valuable tips right inside your inbox, once per month!

Latest IT News & Insights
Microsoft Dynamics 365 Business Central Main Product Mockup Showcase ERP
Why Business Central enhances and streamlines solutions
See how Microsoft Dynamics 365 Business Central enhances business solutions and streamlines the processes...
Read More
Neuways artificial intelligence
Artificial Intelligence: The Good, The Bad & The Ugly
AI is the Marmite of the IT world. Love it or hate it, the reality is it filters into our everyday lives...
Read More
Choose Neuways for your IT Support, Cyber Security and Business Central needs.
Cyber Security Acronyms Part 1: Neuways
We are helping clients to understand cyber security. We're making it easy for you, as we are jargon busting...
Read More
Password Manager and Security with neuways
Password Managers just became an even more important tool for Employees
The Government has brought in a ban on employees and manufacturers using default passwords.
Read More
Dark Web monitoring
What is the Dark Web?
Dark Web Monitoring identifies whether any of your company data (including login credentials and confidential...
Read More
Password Manager and Security with neuways
Password Security
Business Password Manager Tool Protect your remote workforce with Password Manager Tool, the business...
Read More
WatchGuard WiFi Security
WatchGuard User Services Platform – Simple, Secure and Intelligent WiFi
Why do Neuways partner with WatchGuard? Find out below to see how we improve the cyber security of your...
Read More
Endpoint Security
Endpoint Security
Protect your business with the best in Endpoint Security – How Neuways can help you Protect Your...
Read More

Frequently Asked Questions

Managed IT support is a comprehensive solution where an expert IT provider, like Neuways, handles your technology infrastructure. This includes proactive monitoring, maintenance, cyber security, and support.

Contact us

Support: 01283 753300

Business Development: 01283 753333

Purchasing: 01283 753322

Admin and Accounts: 01283 753311

Email: hello@neuways.com

Yes we do. Your business needs Cyber Security due to the increasing number of cyber threats that are affecting businesses in all industries. If your business has data and technology systems implemented, you will need Managed Cyber Security.

Yes we can. We have our own dedicated Microsoft Dynamics 365 Business Central teams who work to ensure that we can implement the right systems and solutions into your website that are absolute right for you. 

Got a question?

Reach out
& Connect

Please enable JavaScript in your browser to complete this form.
Name