Product News

Find out about our new product features, the latest platform changes, and discover company announcements before anyone else.

Risk Management

Stay up to date on third-party risk management best practices and techniques, and learn about new regulations for third party risk.

Security Research

Keep up with research around the biggest data breaches, malware infections, IoT risks and all the latest news in cybersecurity.

How Big is the End-Of-Life Cybersecurity Problem? [INFOGRAPHIC]


End-of-Service or End-Of-Life (EOL), is a term applied to hardware or software when a manufacturer stops supporting it with any updates. This can be very problematic since any vulnerabilities that are found (and can subsequently be exploited by hackers) will never be patched. This can cause widespread damage if a software, such as an operating system, becomes End-Of-Life and is still used by companies and enterprises. Fortunately, manufacturers usually announce that they will cease support with enough time in advance for companies to upgrade or replace the End-Of-Life product.

Unfortunately, not all companies react swiftly and EOL products are still in use, increasing the risk of exploitation and a resulting data breach. For example, mainstream support for Windows XP ended in 2011 and extended support ended in 2014. Microsoft continued to support an embeddable version of Windows XP for ATMs until January 2016. However, as Motherboard reported last year, an estimated 35,000 computers on London’s Metropolitan Police network is still using the EOL product.

More recently, the last updates on Internet Explorer version 8, 9, and 10 were released in mid-January. If you or your employees are not using Internet Explorer 11 or Microsoft’s Edge Browser and instead using an unsupported version of the browser, then you and your company’s security is exposed to known vulnerabilities.

If you want to learn about the extent of the End-Of-Life problem, check out our infographic below.




GV (formerly Google Ventures), Leads $20 Million Series B Round for SecurityScorecard
Part 1: Stop Spending Your Vendor Risk Management Resources on the Wrong Security Assessments