CONNECTING THE DEFENCE COMMUNITY WITH INSIGHT, INTELLIGENCE & OPPORTUNITIES

Officially Supported By: Defence Contracts International Supply2Defence

Official Media Partners for:

Positive Technologies have released advice on maintaining cyber security following Microsoft’s decision to stop Windows 7 support.

Cyber Security Resilience Lead at Positive Technologies, Leigh-Anne Galloway, has spoken about how Windows 7 users can ensure they are maintaining cyber security without updates. Microsoft has stopped support for Windows 7 which means users won’t receive important security updates and patches to keep their machines safe.

Galloway has commented on the risks and ways users can protect themselves. She discussed the challenges presented by Microsoft’s changes and how users can keep their data safe.

Leigh-Anne Galloway said: “Microsoft’s decision to stop support for Windows 7 presents multiple opportunities for attackers to exploit ordinary users. Especially given that the operating system is still popular. In December 2019, 26% of Windows users have Windows 7 installed, according to Statcounter. When a new zero-day vulnerability (the so-called 0-day) is discovered by attackers, the consequences are countless. For example, the popular cyberattack exploit EternalBlue and when hackers used the WannaCry network worm to infect a web of computers.”

“At the same time, attackers can take a different path, for example, stealing personal account data and passwords, infecting the system with banking Trojans; specialized banking trojans that are designed to steal account data from electronic banking systems, electronic payment systems, plastic cards, etc. We note that such data is lucrative and attractive on the darkweb. To reduce the risk of being attacked, we recommend that you use protection tools, download files only from official sites, carefully treat any attachment files received by e-mail, and update the software on your PC. Do not forget to back up all important files to a separate hard drive, and for all accounts enable two-factor authentication.”

If you would like to join our community and read more articles like this then please click here.

Computers cyber security cyber threats Data Information microsoft software

Post written by: Vicky Maggiani

Vicky has worked in media for over 20 years and has a wealth of experience in editing and creating copy for a variety of sectors.

LATEST STAKEHOLDER

Become a Stakeholder today and benefit from an exclusive marketing package which will allow you to:

  • Engage with active defence buyers and key supply chain partners
  • Create your own branded micro-site which within Defence Online which is managed by you
  • Have a dedicated Digital Account Manager to help enhance your Stakeholder page
  • Promote your news, products, press releases, eBooks and Videos as a Defence Online partner which feeds through to our homepage and social media channels
  • Have your company promoted on our partner website Defence Contracts Online (DCO)
  • All news promoted in mynewsdesk, a major hub for all of our news articles which enables news to be picked up from trade magazines, national newspapers and many other publications which offers extra exposure at no additional cost!

Contact us today or call us on 0845 557 1315 to take advantage of this exclusive marketing package


RELATED ARTICLES

Open-source intelligence (OSINT) is now critical to defence and national security, but the sheer volume of available online multi-media data and its complexity put analysis beyond human ability.

November 19, 2024

OSINT Technology advances are just what the UKs hard-pressed defence sector needs

Open-source intelligence (OSINT) is now critical to defence and national security, but the sheer volume of available online multi-media data

How defence contractors benefit from increased defence spend and strategic cross-border initiatives

October 21, 2024

International opportunities abound

How defence contractors benefit from increased defence spend and strategic cross-border initiatives, article submitted by Richard Tall, Hans Mehrens,