91ֱ

Spotlight of the week: Outdated and Unpatched Devices Risk

October 17, 2024

Why are outdated or unpatched devices risky?

Devices that have reached the end of their life, meaning they’re no longer supported by the manufacturer or service providers, stop receiving firmware updates. This makes them unsuitable for today’s environment, where security vulnerabilities can be easily exploited without the necessary updates. The same applies to outdated operating systems—over time, they receive fewer updates and security fixes. A computer without updates is more vulnerable to attacks because of its unpatched weaknesses.

Alarming breach from the past. Be aware. Be cybersmart.

Windows devices

A major security incident (malware that steals your data and encrypts your computer demanding a ransom) in the year 2017 impacted more than 200,000 computers across 150+ countries across the globe.  The cause of the widespread attack was unpatched windows systems.

The security flaw on the windows OS called “” was discovered by the US National security Agency (NSA). This security flaw and the exploit was stolen from the NSA by a hacker group and released to the public. This led to WannaCry ransomware spread across the computers, almost like a thief walking into houses with unlocked doors. 

Mac devices

In August 2024, researchers discovered devices that could allow an attacker to access microphones and cameras without the user’s knowledge. Through these flaws hackers could secretly record video or audio.

What are the takeaways?

The lesson is clear: keeping devices and software up to date is essential. Security researchers regularly discover new vulnerabilities, and outdated systems are at a much higher risk of being compromised.

Manufacturers release security updates to address these risks, but if your device isn't up to date, you're far more vulnerable to hackers gaining access to your system.

What can you do?

  • Check your device now to ensure your and are up to date.
  • If you are running Windows 10, Education Commons will reach out to you to schedule an upgrade in the next two weeks.
  • Ensure all third-party applications on your devices are from trusted sources and up to date. If you are not sure of the third-party application that you’d like to use, contact Education Commons for a security risk assessment.
Share this Article: