Gone But Not Forgotten – Retired Systems and their impact on the IT Workload

Updated: Apr 6

As of January 14, 2020, Microsoft will discontinue Windows 7 support as planned for the operating systems’ End of Life (EOL). To some organizations, this operating system (OS) might seem like a distant memory. However, nearly 30% of the world’s computers – or more than 400 million – still run Windows 7 and are only now contemplating migration to Windows 10. Millions of users will be depending on an unsupported OS for some time after its retirement and IT teams will still be responsible for maintaining these systems.



While Microsoft will not be globally pushing out any more security patches for Windows 7 after Jan 14th, customers can pay for a security update service which will deliver patches until 2023. Failure to sign-up for and implement these patches will mean operating an OS that is vulnerable to malicious actors. IT teams will need to continue updating and patching Windows 7 as long as their company is using it – even if they are in the process of migrating to Windows 10.


The Windows 7 retirement is a highly visible example of what is happening with many systems and applications all over Corporate America. Most businesses operate a variety of applications, all of which reside somewhere on the continuum of development, maintenance, and retirement. During the latter two stages, patch updates are often required. While some updates can be automatically performed via subscriptions, others require the manual identification and implementation of patches as they become available. This is especially true of retired or end-of-lifed applications, including those that a company may be transitioning away from, but still has in use.


It’s a tall order for IT teams to diligently identify and assess the security of a growing number of systems and applications, most of which continuously evolve, without losing track of systems that are EOL. But with the right tools and personnel, businesses can do their best to stay one step ahead of cyber attackers.


Vulnerability Identification: Awareness is the First Step


Knowing what is on your network is vital to creating a robust security program. Many IT teams struggle to establish and maintain an effective system for comprehensively identifying vulnerabilities across their network. To achieve complete vulnerability scans, several scanning tools are dependent on updated system inventories. These can be difficult to maintain when working in fast-paced development environments or areas with high staff turnover. Often, companies are running systems or software they aren’t even aware of due to inadvertent knowledge gaps or lack of documentation. Fortunately, there are solutions that are less dependent on external asset inventories. For example, Frontline Vulnerability Manager™ (Frontline VM™) provides the flexibility to scan by IP ranges or hostnames across the network and automatically identify asset types for you eliminating potential blindspots and forgotten assets. Additionally, Frontline VM scans both internal and external assets.


Effective vulnerability scanning looks for weaknesses across the entirety of a business, from firewalls to weak configurations or missed security patches. Frontline VM uses patented network security auditing technology that eliminates network drift and digs deeper into assets. This powerful, yet easy-to-use VM overcomes the limitations of other scanners to provide complete and highly accurate results that can be easily prioritized.


Vulnerability Prioritization: They Can’t all be Priority #1


It is estimated by the National Vulnerability Database (NVD) that 45 new vulnerability disclosures are discovered every day, and nearly 60% are rated “critical” or “high” severity. However, those rankings do not universally apply to each unique organization. IT teams must be able to discern which among the multitude of vulnerabilities they face poses the most significant risk to their organization’s infrastructure and operations. This means prioritization by several different criteria that take individual company characteristics into account.


Frontline VM scanning results are presented in clear, actionable reports that offer a variety of features to aid in prioritization.  These include:


  • Robust filter capabilities, including exploitability filtering

  • Intuitive security rating metrics (Frontline Security GPA®)

  • Peer comparison (Frontline Insight™)

  • Network mapping (Frontline Network Map™) for interconnectivity insight.


Keep the Workload Manageable


As businesses continue to use more and varied technology, and tech creators continue to develop and iterate, the need for effective vulnerability management becomes increasingly acute. Without it, your business will not be able to manage the volume of necessary updates and patches and will be at increased risk of a breach or cyberattack. Don’t let the mountain of mitigation tasks paralyze your IT team. Contact us today to learn more about how Frontline VM can help.


LET US SHOW YOU – DEMO TIME!