Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Thanks to Google, Windows XP is About to Get Even More Risky to Use

b2ap3_thumbnail_google_ends_xp_support_400.jpgIt’s been over a year and a half since Microsoft gave up support on its extremely popular operating system, Windows XP. Without the necessary patches and security updates, Windows XP becomes a hazardous system to run for average users and business professionals. Now, things are about to get worse as Google cuts support for its popular web browser, Google Chrome, for Windows XP and several other older operating systems.

It’s reported that Google will cease to update Windows XP and other older Apple operating systems with the required patches and security updates for Google Chrome. This means that using Chrome on older operating systems will quickly become a liability, and hackers will find holes in your security much more easily than before. If you’re still using these operating systems when this happens, and you’re primarily using Google Chrome as a web browser, you’ll be in a very bad position security-wise. These changes are expected to occur sometime in April 2016, which just so happens to be the two-year anniversary for the end-of-support date of Windows XP.

The following operating systems will be affected by Google ending support for their Chrome web browser:

  • Windows XP
  • Windows Vista
  • Mac OS 10.6 (Snow Leopard)
  • Mac OS 10.7 (Lion)
  • Mac OS 10.8 (Mountain Lion)

In other words, the only way to stay secure while enjoying the benefits of Google Chrome, is to use it on a supported operating system. This means updating your legacy hardware solutions to systems that can handle the latest operating systems, since they will be around for a while. The problem with this is that many businesses rely heavily on their legacy technology, and making such a dramatic change to their computing infrastructures isn’t an option if they want to keep operations pushing forward at full speed. When upgrading to more recent operating systems or modern hardware, legacy compatibility is a huge issue that needs to be addressed.

Besides the fact that many businesses feel comfortable with their technology, and don’t feel the need to replace it regularly, the primary problem with legacy technology is that updating is imperative, yet difficult to achieve realistically without the help of tech-savvy personnel. By eliminating support for antiquated operating systems like Windows XP, Google is giving its users an ultimatum: either upgrade to a more recent (and more secure) operating system, or forfeit the security (and performance) of Google Chrome by continuing to use an unsupported web browser. This might give users just the push they need, as being unable to safely use their favorite web browser can be annoying and frustrating.

Keep in mind that people who use the aforementioned operating systems will still be able to use Google Chrome, but not without forsaking security.

If you’re set on using Google Chrome, you want to make sure that you upgrade to systems that are supported. This goes for more than just Google Chrome, though; you want to make sure that all of your technology systems, including workstations and servers, are up to date and compatible with your legacy technology solutions. For help upgrading your technology systems to something from this decade, give Evolve IT a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Innovation Smartphone Windows 10 IT Support Mobile Devices Network Security Ransomware Gmail Hardware The Internet of Things Social Media Disaster Recovery Communication Hacking Bandwidth WiFi Facebook Microsoft Office Office Operating System Backup Apps Business Continuity Best Practice Alert Networking Data storage Employer-Employee Relationship Windows Two-factor Authentication History Data Experience Small Business Phishing App Mobile Computing communications Mobile Device Management Money Big Data Safety Network Unified Threat Management Quick Tips Managed Service Provider Outlook Wireless Technology Firewall Smartphones Android Content Filtering Apple Cybercrime Website Entrepreneur Managed IT services Presentation Domains Cortana Proactive IT Network Congestion Save Money Bluetooth Hacker Music Automation Application Cryptocurrency Memory Laptop Customer Service IBM Google Docs Education Deep Learning Router Cleaning BDR Holiday YouTube Office 365 Processors Black Market Office Tips LiFi Vendor Management Staffing Saving Money BYOD Downtime Analytics Streaming Media Lithium-ion battery Help Desk intranet Passwords Micrsooft Visible Light Communication Monitors Disaster Data Management Social Networking Business Growth Robot Advertising Displays Recovery Public Speaking Virtualization Society Sports IP Address Spam Google Wallet Information Technology End of Support Running Cable Government Augmented Reality Keyboard Windows 8 Internet of Things Hosted Solution Windows XP Search IT Services User Artificial Intelligence Writing Documents Hard Drives Compliance Remote Computing Shortcut Tech Support Drones DDoS Word Social Heating/Cooling Browser Printer Virtual Desktop Wireless Business Management Unified Communications Retail Securty Encryption Document Management Law Enforcement SaaS VoIP Competition
QR-Code