Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Thanks to Google, Windows XP is About to Get Even More Risky to Use

b2ap3_thumbnail_google_ends_xp_support_400.jpgIt’s been over a year and a half since Microsoft gave up support on its extremely popular operating system, Windows XP. Without the necessary patches and security updates, Windows XP becomes a hazardous system to run for average users and business professionals. Now, things are about to get worse as Google cuts support for its popular web browser, Google Chrome, for Windows XP and several other older operating systems.

It’s reported that Google will cease to update Windows XP and other older Apple operating systems with the required patches and security updates for Google Chrome. This means that using Chrome on older operating systems will quickly become a liability, and hackers will find holes in your security much more easily than before. If you’re still using these operating systems when this happens, and you’re primarily using Google Chrome as a web browser, you’ll be in a very bad position security-wise. These changes are expected to occur sometime in April 2016, which just so happens to be the two-year anniversary for the end-of-support date of Windows XP.

The following operating systems will be affected by Google ending support for their Chrome web browser:

  • Windows XP
  • Windows Vista
  • Mac OS 10.6 (Snow Leopard)
  • Mac OS 10.7 (Lion)
  • Mac OS 10.8 (Mountain Lion)

In other words, the only way to stay secure while enjoying the benefits of Google Chrome, is to use it on a supported operating system. This means updating your legacy hardware solutions to systems that can handle the latest operating systems, since they will be around for a while. The problem with this is that many businesses rely heavily on their legacy technology, and making such a dramatic change to their computing infrastructures isn’t an option if they want to keep operations pushing forward at full speed. When upgrading to more recent operating systems or modern hardware, legacy compatibility is a huge issue that needs to be addressed.

Besides the fact that many businesses feel comfortable with their technology, and don’t feel the need to replace it regularly, the primary problem with legacy technology is that updating is imperative, yet difficult to achieve realistically without the help of tech-savvy personnel. By eliminating support for antiquated operating systems like Windows XP, Google is giving its users an ultimatum: either upgrade to a more recent (and more secure) operating system, or forfeit the security (and performance) of Google Chrome by continuing to use an unsupported web browser. This might give users just the push they need, as being unable to safely use their favorite web browser can be annoying and frustrating.

Keep in mind that people who use the aforementioned operating systems will still be able to use Google Chrome, but not without forsaking security.

If you’re set on using Google Chrome, you want to make sure that you upgrade to systems that are supported. This goes for more than just Google Chrome, though; you want to make sure that all of your technology systems, including workstations and servers, are up to date and compatible with your legacy technology solutions. For help upgrading your technology systems to something from this decade, give Evolve IT a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 22 January 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Efficiency Workplace Tips Google Hosted Solutions Microsoft Upgrade Computer IT Support Mobile Devices Innovation Smartphone Windows 10 Hardware Gmail Network Security Ransomware Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Communication Hacking Operating System WiFi Facebook The Internet of Things Social Media Bandwidth Experience Firewall Mobile Device Management Money Content Filtering Cybercrime Network Smartphones Website Managed Service Provider Outlook Wireless Technology Employer-Employee Relationship Android History Two-factor Authentication Apple Small Business Phishing App Best Practice Mobile Computing Alert communications Big Data Safety Networking Data storage Unified Threat Management Quick Tips Data Windows Google Docs Government Education Keyboard Cleaning Holiday Augmented Reality Search User Black Market YouTube Processors End of Support Staffing Hard Drives Office Tips LiFi Shortcut BYOD Downtime Remote Computing DDoS Passwords Streaming Media Help Desk Writing Disaster Heating/Cooling Micrsooft Word Visible Light Communication Business Growth Data Management Advertising Recovery Robot Business Management Society Sports Retail Competition Google Wallet Spam Information Technology Running Cable Presentation Entrepreneur Windows 8 Internet of Things Domains IT Services Managed IT services Hosted Solution Windows XP Artificial Intelligence Documents Hacker Tech Support Compliance Bluetooth Application Drones Social Customer Service Printer Browser Automation Wireless Memory Virtual Desktop Unified Communications Securty Router Document Management Encryption Deep Learning Office 365 VoIP BDR Law Enforcement SaaS Saving Money Analytics Lithium-ion battery Proactive IT intranet Cortana Vendor Management Network Congestion Save Money Music Social Networking Monitors Public Speaking Virtualization Cryptocurrency Laptop IP Address IBM Displays
QR-Code