Staying secure upon the death of Windows XP

Extended support for XP will soon be no more. Tom Brewster asks if your business is ready for the deadline?

s

, by placing XP machines on a dedicated network segment to prevent access from other machines in the organisation's environment, can help minimise the threat from malicious hackers. User accounts could also be limited, reducing their privileges, meaning that if a hacker does compromise the machine, they won't be able to easily acquire root access to the system.

There are a ton of cloud services people can use to back up their data, so they can upgrade without losing information.

Migrating data and apps

Once the preparations have been made, it's time to consider whether the business should even stick with Windows, given other options might be cheaper and more secure.

"What people upgrade to depends on their needs. For some people a Chromebook is a great alternative. Otherwise, there are plenty of free Linux distributions available. Alternatively, if you have cash, Mac is a good alternative," says Malik.

Then comes the process of migrating applications and data to the new OS, whatever it is. The cloud can be of assistance here, from both data storage and security perspectives. "There are a ton of cloud services people can use to back up their data, so they can upgrade without losing information," Malik adds.

Solid Bring Your Own Device (BYOD) policies should also allow for continuity during migration, or a completely new option away from Windows. "For those that have failed to take the necessary steps to upgrade, we may see these businesses embracing Bring Your Own Devices (BYOD), where employees bring their own personal devices for work purposes, as a quick solution to the problem. BYOD potentially offers a fast track to upgrading outdated systems as employees, who tend to be using newer operating systems at home, can thus increase the levels of protection to a business' IT system," says Mark Brown, director of information security at consultancy EY.

Featured Resources

Humility in AI: Building trustworthy and ethical AI systems

How humble AI can help safeguard your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment

Download now

Why you need to include the cloud in your disaster recovery plan

Preserving data for business success

Download now

Most Popular

Huawei Mate 40 Pro 5G review: A tragically brilliant Mate
Mobile Phones

Huawei Mate 40 Pro 5G review: A tragically brilliant Mate

26 Nov 2020
What is phishing?
phishing

What is phishing?

25 Nov 2020
Microsoft Teams no longer works on Internet Explorer
Microsoft Office

Microsoft Teams no longer works on Internet Explorer

30 Nov 2020