Security Manager's Journal: A rush to XP's end of life
The end of Microsoft support is fast approaching, and the company still has a lot of machines running the old Windows operating system
Computerworld - With one week left to go in the official life of Microsoft's Windows XP operating system, my company's IT department suddenly realized that it is way behind where it should be on its plan to meet the deadline.
As almost everyone knows by now, Microsoft will be ending support for Windows XP on April 8. The most important concern we security managers have about this apocalyptic event is that Microsoft will no longer issue security updates for vulnerabilities in XP. This will leave XP users without the ability to harden their PC operating system against the inevitable attacks that will exploit inherit vulnerabilities discovered from April 8 onward.
Some doomsayers have even gone so far as to paint the harrowing picture of an army of hackers waiting to push the Enter keys on their keyboards on April 8, taking over the world's XP systems at a stroke. While I personally doubt this particular scenario, I do think that the risk of attack against XP systems will increase every day from April 8 forward, and after 60 or 90 days, the risk will be so great that nobody should use the operating system any longer.
I've had my eyes on this risk for quite some time. My company's data center manager has been running a project to replace windows XP with Windows 7 across the company, and it's only now that he's realized he's way behind where he thought he should be by now. In fact only half of the company systems have been converted at this point, with only a week left. Now he has called all hands on deck to try to catch up the remaining systems over the next week. Good luck.
It seems we are not alone. News articles abound with stories about windows XP stragglers. Even ATMs are being called out as running the obsolete operating system. Who knows, maybe on the day after the deadline all the ATMs running Windows XP will spit out all the cash on the ground. Then again, maybe not. But one would think that ATMs should be some of the most secure devices on the planet. I have to wonder, who designed those things with XP in them in the first place? That doesn't seem like the best choice at all. I only hope our nuclear submarine fleet is running something better.
Of course, we have antivirus software to help compensate for the lack of security updates on our XP computers. But signature-based malware protection is just not enough. My sophisticated security monitoring systems routinely detect malware infections that were not stopped by the endpoint antivirus software. We have to go out and reimage infected systems with a fresh operating system installation on a frequent basis because of malware infections that slipped through the endpoint defenses and that I deem too dangerous to clean. So what else can we do to protect the stragglers?
More by J.F. Rice
- Security Manager's Journal: Trapped: Building access controls go kablooey
- Security Manager's Journal: We manage our threats, but what about our vendors?
- Security Manager's Journal: With Heartbleed, suddenly the world is paying attention to security
- Security Manager's Journal: A rush to XP's end of life
- Security Manager's Journal: Security flaw shakes faith in Apple mobile devices
- Security Manager's Journal: Cyberattacks just got personal
- Security Manager's Journal: Target breach unleashes fresh scams
- Security Manager's Journal: Giving thanks for SIEM
- Security Manager's Journal: Hashing out secure applications
- Security Manager's Journal: Why the shutdown is like the cloud
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!