Home Page Navigation Contents Contact Sitemap Search

Consider support life cycles

It is not just food, but also digital products such as programs, apps and devices which have an expiry date. If this is exceeded, updates no longer made available, and any potential vulnerabilities remain unresolved.

Every operating system, program or app has a lifecycle. This starts when the product is first published, and ends when a product is no longer supported, i.e. no longer updated.

The so-called support lifecycle decides whether software is secure or not. Once this ends, any potential vulnerabilities are no longer resolved with the help of security patches. This leaves a product vulnerable, and you should replace it with an alternative one as soon as you can. You should definitely no longer use any software once its lifecycle has expired.

For as long as you are aware of the relevant expiry dates of your products, you can then make well-founded decision whether to update, upgrade or replace your software. Manufacturers like Microsoft, Apple and Google regularly publish the dates support for their products ends.

Protect your devices and data by regularly checking how long your operating system, programs and apps are supported for – and make sure you replace obsolete software in good time.

Windows lifecycle information sheet

Further general information can be found here.

What else would you like to learn about security when e-banking?

Register for a course now
and learn more:

Online basic course

Find out about current Internet threats and some easy protective measures, and how to securely use e-banking.

further information

Online course mobile banking/payments

Find out about mobile banking, mobile payments and how to securely use these apps.

further information

Online course on cryptocurrencies

Cryptocurrency beginner? Find out about the most popular cryptocurrencies and the Blockchain technology behind them.

further information

Online course for SMEs

Is your organisation sufficiently secure? Learn which measures you can take to significantly strengthen your organisation’s IT security.

further information