[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-cybersecurity-and-eol\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-cybersecurity-and-eol\/","headline":"The Ping: CyberSecurity and EOL","name":"The Ping: CyberSecurity and EOL","description":"End of life can be detrimental to your network security! Learn what happens to your network and individual systems when you don't upgrade.","datePublished":"2019-06-07","dateModified":"2019-07-15","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","height":"126","width":"300"},"url":"https:\/\/univista.com\/posts\/the-ping-cybersecurity-and-eol\/","about":["business management","desktop","disaster recovery","malware","network","planning","Security","The Ping","update","vulnerability","windows"],"wordCount":496,"keywords":["compliance","end of life","hackers","malware","Security","updates","upgrade","upgrades","Virus"],"articleBody":"ShareTweet                                        Over the past few weeks we\u2019ve been talking about the importance of upgrading your near EOL, or end of life, systems. While it\u2019s important to know that not replacing these machines can slow down your network, let\u2019s talk about how it could leave your network open to malware&nbsp;and overall vulnerabilities.&nbsp;&nbsp;Updates&nbsp;Are you aware that continuing to use a machine that can no longer receive updates can put you at risk? The problem is it will not only put YOU at risk, but also your business associates, family and friends. If a hacker gains access to your machine, they can use that same malware to obtain access to your contacts.&nbsp; In&nbsp;The Ping: End of Life &#8211; Server and Desktop&nbsp;we discussed the issues that your company could face. These include, but are not limited to, the degradation of your system performance, vulnerabilities in the network,&nbsp;and slower performance from employees as their desktops begin to atrophy.&nbsp;&nbsp;&nbsp;Software&nbsp;&nbsp;&nbsp;Not only does the continual&nbsp;use&nbsp;of end of life machines mean you could be opening yourself up to attack, it also&nbsp;means the&nbsp;possibility that your company software will no longer be functional. Updates to your server or desktop software aren\u2019t the only updates that stop.&nbsp;&nbsp;Updates to company software, including your antivirus programs, would also cease to&nbsp;update. Your first line of defense to preventing malware from entering your network is your antivirus program.&nbsp; Allowing malware to infiltrate your network can end up costing your network&nbsp;thousands of dollars&nbsp;to fix. This could also leave the company&nbsp;shut&nbsp;down for an unknown amount of time.&nbsp;&nbsp;&nbsp;&nbsp;Infrastructure&nbsp;&nbsp;While we\u2019ve said so much about the need to upgrade your servers and desktops, we have yet to remind you about another important potential security concern. Your network devices, such as firewalls and switches, also come with an end of life on their updates and patches. \u201cUnsupported products that don\u2019t receive critical security patches and updates are susceptible to data breaches and malware attacks. This is particularly true for firewalls, intrusion prevention systems and other security devices that protect the edge of the network\u201d &#8211;&nbsp;ICG. Switches and firewalls that are over a couple of years old are considered&nbsp;ineffectual. Allowing these to stay on your network is the equivalent of leaving the front door open!&nbsp;&nbsp;&nbsp;Keeping your systems and network safe can be&nbsp;simple&nbsp;if you have the right tools&nbsp;in place. Here at&nbsp;UniVista&nbsp;we strive to make sure your company is prepared for the next steps in your End of Life system replacements. Feel free to reach out to your account managers to address any concerns you may have.&nbsp;Your UniVista Team Celebrating 20 Years of Customer SatisfactionShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"The Ping: CyberSecurity and EOL","item":"https:\/\/univista.com\/posts\/the-ping-cybersecurity-and-eol\/#breadcrumbitem"}]}]