News

End of support: Security tips for Windows XP users

At the time of this writing, Microsoft will end support for Windows XP in less than 12 hours. Earlier this year, the organization announced that support for the aging operating system will end April 8, and that date has finally come.

According to Microsoft, end of support means that enterprise users will no longer receive security updates or technical assistance with their systems. This could create serious security vulnerabilities, especially in the case of unpatched weaknesses that hackers often look to exploit.

Currently, NPR estimates that about 30 percent of computers across the globe are still powered by Windows XP, which recently reached the 12-year-old mark. With support ending in less than one day, this puts these users in jeopardy of cyberattacks and other criminal activity, noted security consultant Patrick Thomas.

"What once was considered a low-hanging fruit by hackers now has a big neon bull's eye on it," Thomas said.

For this reason, it is important that these users take steps to protect themselves, their devices and the sensitive information stored there. While many look to migrate away from the unsupported system, Gartner reported that when certain best practices are utilized, Windows XP can still be utilized until the firm or individual can complete the transition to a new OS, according to ZDNet.

Security tips: Steps to take after end of Windows XP support
One of the first steps to take in these regards is to restrict the device's access to the network and certain applications. Gartner vice president Neil MacDonald told ZDNet that connectivity points are prime attack routes for hackers looking to access vulnerable systems like Windows XP. The best option to protect against this method is to disconnect the XP-powered hardware from the network altogether.

MacDonald also noted that only approved applications that have been established as safe for the OS should be allowed to run. Hardware should be locked down in such a way that the device cannot run arbitrary code. Users can leverage an intrusion-prevention system or an application whitelisting software which catalogues all secure programs and blacklists any other app attempting to run on the system.

In addition, organizations continuing to utilize XP should update all other software running on the hardware. ZDNet noted that while XP may not have support, other programs are likely still receiving security patches which should be installed to prevent exploitable weak points.

"It's important that antivirus, firewalls, software distribution clients, and browsers should be up to date, along with Java, Adobe, Office and other common infrastructure apps," ZDNet contributor Toby Wolpe wrote.

Users should also seek to protect individual databases and content as well. Especially within a business environment where employees and administrators may store sensitive company data on workstations, it is vital that these materials be adequately safeguarded to prevent unauthorized access. This can be achieved through encryption technology available from an SSL certificate that renders secured information unreadable to unapproved users. This security measure can be attained through a trusted certificate authority that can provide the high-level encryption necessary to keep sensitive business content safe.

Protect data in transit with an SSL certificate today.

corporate office

Thawte
The Gateway
Century Lane
Century City, 7441
Cape Town
South Africa

Postal Address:
P O Box 15986
Panorama 7500
Cape Town
South Africa

Call: +353 1 793 9141
Fax: +27 21 819 2950

Buy now! Try now!