Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Know When Your Windows OS Expires and Why it Matters

Tip of the Week: Know When Your Windows OS Expires and Why it Matters

By design, Microsoft’s operating systems aren’t built to last forever. Due to the fact that technology is always changing, new operating systems with better security and improved capabilities are routinely needed. Microsoft gets users to transition from an older OS to a newer one by ending support for the older one. This begs the question, how long until Microsoft pulls the plug on your OS?

Before we provide you with a list of expiration dates, we first must clarify the difference between Microsoft ending mainstream support of an OS vs. ending its extended support. Think of it like this, instead of Microsoft abruptly pulling the plug on a widely used OS, they will instead phase it out with two end-of-support dates which are generally five years apart. Here’s the difference between the two dates:

  • Mainstream support: When mainstream support ends, Microsoft stops issuing non-security related fixes unless you have a previously-established extended support agreement. Warranty claims also end, and Microsoft stops accepting requests for new features or design alterations.
  • Extended support: When extended support ends, Microsoft will no longer issue critical patches and security updates. When this happens, your systems will be exposed to vulnerabilities that won’t be fixed. The only solution is upgrading to a more recent OS, or biting the bullet and purchasing exorbitantly expensive custom support from Microsoft.

Now that you have a grasp on the different kinds of support provided and taken away by Microsoft, here’s the list of end-of-support dates that you came here for:

End of Support for Windows Operating Systems

  • Windows 10: Mainstream support ends October 13, 2020, while extended support ends October 14, 2025.
  • Windows 8.1: Windows 8.1’s mainstream support ends January 9, 2018, and its extended support ends January 10, 2023.
  • Windows 8: Windows 8 is no longer supported by Microsoft. To continue receiving patches and security updates, upgrade to Windows 8.1 or Windows 10.
  • Windows 7: Windows 7’s mainstream support ended on January 13, 2015, and its extended support ends on January 14, 2020.
  • Windows Vista: Windows Vista’s mainstream support ended on April 10, 2012, and extended support ends on April 11, 2017.

Now, just because you’re running an OS that’s currently supported by Microsoft, doesn’t mean that your system is up to snuff. Microsoft only sends you the Windows updates and security patches; it’s up to you to apply them. If you don’t, then you’re leaving your system vulnerable.

It’s easy enough to apply Windows updates for your home PC, but it’s another thing entirely to apply Windows updates across all of your company’s workstations and server units, and verify that they’ve been applied correctly. Generally speaking, you will want an IT professional to assist you with this so that an update doesn’t interfere with a mission-critical application and cause downtown.

For assistance with all of your upgrading needs, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 February 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet IT Support Efficiency Malware Privacy Email Google Phishing Workplace Tips Computer IT Services Users Collaboration Hosted Solutions Mobile Device Quick Tips Ransomware Workplace Strategy Small Business Microsoft Cybersecurity Data Backup Communication Smartphone Saving Money Passwords Business Management VoIP Smartphones Android Mobile Devices communications Backup Upgrade Managed Service Data Recovery Browser Managed IT Services Disaster Recovery Social Media Microsoft Office Windows Tech Term Network Remote Internet of Things Artificial Intelligence Automation Facebook Cloud Computing Covid-19 Remote Work Miscellaneous Current Events Gadgets Productivity Server Managed Service Provider Holiday Outsourced IT Information Employee/Employer Relationship Encryption Spam AI Windows 10 Training Data Management Business Continuity Compliance Office Government Windows 10 Bandwidth Business Technology Virtualization Wi-Fi Blockchain Apps Data Security Two-factor Authentication Mobile Office Mobile Device Management Chrome Gmail Budget Apple Managed Services Voice over Internet Protocol App Employer-Employee Relationship Networking Vendor Applications Access Control WiFi Tip of the week Conferencing How To BDR Computing Hacker Information Technology Avoiding Downtime Marketing BYOD Office 365 Analytics Office Tips Virtual Private Network Augmented Reality Health Storage Password Help Desk Bring Your Own Device Big Data Retail Healthcare Managed IT Services Operating System Computers Risk Management Website HIPAA Router Display IT Support Printer Firewall Paperless Office Windows 11 Infrastructure 2FA Monitoring The Internet of Things Excel Document Management Social Remote Workers Telephone Going Green Scam Data loss Cooperation Free Resource Customer Service Cybercrime Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Outlook Modem User Tip Processor Computer Repair Mobile Security Money Humor Holidays Data Storage Safety Smart Technology Supply Chain Sports Video Conferencing Mouse Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Administration Managed IT Service Maintenance Downloads Antivirus iPhone Licensing Customer Relationship Management Settings Vulnerabilities Printing Wireless Entertainment Content Filtering Data Privacy Hacking Presentation YouTube Images 101 Robot Mobility Cryptocurrency Telephone System Multi-Factor Authentication Cost Management Wireless Technology Virtual Desktop IT Management Data storage LiFi VPN Employees Meetings Physical Security Integration Word Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Refrigeration Halloween Database Surveillance Virtual Assistant Outsource IT Public Speaking Media Network Management Tech Support IT Technicians Virtual Machine Environment Lithium-ion battery Cookies Monitors Cyber Monday Medical IT Hacks Entrepreneur Scary Stories Proxy Server Reviews Fun Tactics Development Hotspot Transportation Small Businesses Deep Learning Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Undo Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Education Navigation Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Workplace Mobile Computing Lenovo Gig Economy Search Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Application Best Practice Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Buisness Superfish Bookmark Download Net Neutrality Twitter Alerts SQL Server Technology Care IBM Legal IT solutions Business Communications Business Growth Financial Data Error History Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Cortana Upload Procurement Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Alt Codes Social Network Telework Cyber security Tablet IoT Communitications Dark Web Cables Competition Downtime CES Trends Supply Chain Management Alert Hosted Solution Dark Data Google Calendar Term Google Apps Typing Managed IT Customer Resource management FinTech File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Knowledge Gamification Flexibility Notifications Staff Value Business Intelligence Google Drive User Legislation Shortcuts Organization Travel Social Networking Google Maps Smart Devices Ransmoware 5G Techology Fileless Malware Digital Security Cameras Experience Content Remote Working Wearable Technology Memory Vendors IP Address Google Docs Unified Communications Comparison Google Play Be Proactive Bitcoin Running Cable Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Google Wallet Unified Threat Management Directions Videos Wasting Time Threats Recovery Network Congestion Specifications Security Cameras Workplace Strategies Hard Drives Windows 8 Laptop Trend Micro User Error Microchip Internet Exlporer Software as a Service Fraud Meta Domains Drones

Blog Archive