Old Internet Explorer versions become a risk

A Data Center
In the just delivered February update of "Windows" many security holes in "Windows", "Office", and the two included browsers "Internet Explorer" and "Edge" are plugged again. We recommend our customers to use only a "Windows" version 7 or higher, to install the security update as soon as possible - if this is not done automatically - and to allow the automatic installation of updates in Windows.

We know that companies with expensive special software (e.g. medical practices) have a hard time with updates of the operating system software. However, if your special computer is connected to an internal network or even the Internet, you should take action.

Older versions of the “Internet Explorer” browser (“IE”) now no longer receive updates and become a security problem!

Security problem means, for example, that malware can be infiltrated: Your data can possibly be read and manipulated on your computer from the Internet, e.g. patient data, bank data. It is possible that your office computer can be completely controlled remotely (“zombie” computer) and can be used for criminal activities of third parties.

Even if you use “Google Chrome” or “Firefox” as your browser, “Internet Explorer” should also be kept up to date. If you are using a newer operating system than “XP” and have activated “automatic updates”, you will probably already find current versions of the browser on your computer. Otherwise, you should act now at the latest:

  • “Vista” users should use at least IE 9″ (or upgrade from “Vista” to “Windows 7” or newer).
  • “Windows 7” users should update to “IE 11”.
  • “Windows 8” users should upgrade to “IE 11”

DISCLAIMER: The TBA-Berlin is not a law firm. The content provided here is for general information purposes only and does not constitute legal advice. We recommend that you seek independent legal advice before taking or refraining from taking any action based on the content provided here.

TBA-Berlin makes no representations or warranties, express or implied, as to the accuracy, adequacy, validity, reliability, availability or completeness of the information referenced herein. Your use or reliance on any information contained herein is for your personal use and solely at your own risk.

More news

Email account hacked? What is to be done?

Do you suspect that your email account has been accessed and used by strangers?
For example, are there suspicious emails on the email account that have nothing to do with you, mails in the outbox folder, suspicious replies to mysterious emails?
We give you tips on what to do then. Our customers are also welcome to contact us. We are at your side with advice and support.

Continue reading »