10 Reasons Why Security Problems Persist at Microsoft

Even though Microsoft would love it when all their security problems disappear, they simply won't. Face it, Microsoft's operating systems are the most common, and hence, the main target. Hackers are more sophisticated than ever; everyday new holes are found in Microsoft products!

Strange thing is, Microsoft is usually aware at least 9 out of 10 holes/vulnerabilities reported, or has that just become a common excuse? Granted, the software giant has had its hands full with signing deals with companies to boost their usage in Europe and Asia, but isn't there something they can do about their flaws?

In recent years, Microsoft has done a slightly better job of addressing security issues. Unfortunately, its efforts haven't been good enough. Security problems still persist in Microsoft products and the chances of them being eliminated in the near future are slim. Here's 10 keypoints why the chances are slim:

  1. Microsoft is a major target
  2. Windows is an easy target
  3. The competition isn't big enough
  4. The company ignored it for too long
  5. Legacy issues
  6. Where's the focus?
  7. Microsoft is usually a step behind
  8. Users can't be trusted
  9. Hackers are more sophisticated than ever
  10. Few consequences

Only 10 reasons?!

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • U.S. companies are desperately trying to recruit and hire skilled software engineers and developers, but there is simply not enough quality talent to go around. Tiempo Development is a nearshore software development company. Our headquarters are in AZ, but we are a pioneer and leader in outsourcing to Mexico, based on our three software development centers there. We have a proven process and we are experts at providing our customers with powerful solutions. We transform ideas into reality.

  • When individual departments procure cloud service for their own use, they usually don't consider the hazardous organization-wide implications. Read this paper to learn best practices for setting up an internal, IT-based cloud brokerage function that service the entire organization. Find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date