Windows XP will no longer be supported after April

Feb 12, 2014 | IT News

Windows XP Professional is reaching End of Life status in April.  What does this mean?  Well, after April 8th 2014, Microsoft will no longer provide updates for Windows XP.  This means that security updates and fixes for the operating system will no longer be sent to XP computers.  XP will continue to run on computers past the deadline, but it will be more vulnerable to online threats as time goes on.  What’s worse is that more and more software vendors will stop supporting their products on XP after the deadline.  This includes antivirus vendors.

Microsoft has said that it will continue to supply virus definition updates to Microsoft Security Essentials.  However, just updating the definitions does not keep the computer protected.  Currently, Microsoft sends out program updates to MSE to make it more effective.  This will no longer be the case after April.

 

It is very important to replace any aging computers that are still running Windows XP.  To keep your network protected from external threats, and to keep things running efficiently.

 

For more information go here : http://windows.microsoft.com/en-us/windows/end-support-help

More From V2 Systems

The Audit Readiness Problem Government Contractors Can’t Afford to Ignore

Many government contractors are not failing audits because they lack tools. They are failing because documentation is incomplete, evidence is disorganized, and readiness starts too late. This blog explains the most common gaps and how to fix them before an audit begins.

You Can’t Secure What You Can’t See: Why Asset Visibility Is a Cybersecurity Requirement

Asset visibility is one of the most overlooked parts of cybersecurity. In this blog, we explain why businesses need clear visibility into hardware, software, users, and cloud assets to reduce risk, strengthen operations, and support compliance.

When One Suspicious Alert Prevented a Much Bigger Disaster

A former client narrowly avoided a much larger cybersecurity incident after suspicious Microsoft 365 activity revealed an unauthorized intrusion. In this blog, we break down what happened, how phishing may have played a role, why MFA still matters, and what businesses should do next to reduce risk and respond quickly.

CMMC in Practice: How Day-to-Day IT Operations Affect Compliance

CMMC is not just policy. It depends on day-to-day IT execution like patching, access control, monitoring, and documentation. This blog explains what contractors should focus on now, plus why the assessment process can be more expensive than expected.

What Happens After the Breach: How Incident Response Really Works for SMBs

Incident response is what determines whether a cyber incident becomes a short disruption or a major business crisis. This blog explains the real steps SMBs should take after a breach and how MSP support speeds recovery.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic