10 Reasons Why Security Problems Persist at Microsoft

Even though Microsoft would love it when all their security problems disappear, they simply won't. Face it, Microsoft's operating systems are the most common, and hence, the main target. Hackers are more sophisticated than ever; everyday new holes are found in Microsoft products!

Strange thing is, Microsoft is usually aware at least 9 out of 10 holes/vulnerabilities reported, or has that just become a common excuse? Granted, the software giant has had its hands full with signing deals with companies to boost their usage in Europe and Asia, but isn't there something they can do about their flaws?

In recent years, Microsoft has done a slightly better job of addressing security issues. Unfortunately, its efforts haven't been good enough. Security problems still persist in Microsoft products and the chances of them being eliminated in the near future are slim. Here's 10 keypoints why the chances are slim:

  1. Microsoft is a major target
  2. Windows is an easy target
  3. The competition isn't big enough
  4. The company ignored it for too long
  5. Legacy issues
  6. Where's the focus?
  7. Microsoft is usually a step behind
  8. Users can't be trusted
  9. Hackers are more sophisticated than ever
  10. Few consequences

Only 10 reasons?!

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Live Event Date: January 28, 2015 @ 11:00 a.m. ET / 8:00 a.m. PT Check out this upcoming live webcast and join Jeff Sloyer, IBM Developer Evangelist and Master Inventor, for a tutorial for building cloud-based applications. Using IBM's platform as a service, Bluemix, Jeff will show you how to architect and assemble cloud-based applications built for cloud scale. Leveraging the power of microservices, developers can quickly translate monolithic applications to a cloud-based microarchitecture. This hour-long …

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date