Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Know When Your Windows OS Expires and Why it Matters

Tip of the Week: Know When Your Windows OS Expires and Why it Matters

By design, Microsoft’s operating systems aren’t built to last forever. Due to the fact that technology is always changing, new operating systems with better security and improved capabilities are routinely needed. Microsoft gets users to transition from an older OS to a newer one by ending support for the older one. This begs the question, how long until Microsoft pulls the plug on your OS?

Before we provide you with a list of expiration dates, we first must clarify the difference between Microsoft ending mainstream support of an OS vs. ending its extended support. Think of it like this, instead of Microsoft abruptly pulling the plug on a widely used OS, they will instead phase it out with two end-of-support dates which are generally five years apart. Here’s the difference between the two dates:

  • Mainstream support: When mainstream support ends, Microsoft stops issuing non-security related fixes unless you have a previously-established extended support agreement. Warranty claims also end, and Microsoft stops accepting requests for new features or design alterations.
  • Extended support: When extended support ends, Microsoft will no longer issue critical patches and security updates. When this happens, your systems will be exposed to vulnerabilities that won’t be fixed. The only solution is upgrading to a more recent OS, or biting the bullet and purchasing exorbitantly expensive custom support from Microsoft.

Now that you have a grasp on the different kinds of support provided and taken away by Microsoft, here’s the list of end-of-support dates that you came here for:

End of Support for Windows Operating Systems

  • Windows 10: Mainstream support ends October 13, 2020, while extended support ends October 14, 2025.
  • Windows 8.1: Windows 8.1’s mainstream support ends January 9, 2018, and its extended support ends January 10, 2023.
  • Windows 8: Windows 8 is no longer supported by Microsoft. To continue receiving patches and security updates, upgrade to Windows 8.1 or Windows 10.
  • Windows 7: Windows 7’s mainstream support ended on January 13, 2015, and its extended support ends on January 14, 2020.
  • Windows Vista: Windows Vista’s mainstream support ended on April 10, 2012, and extended support ends on April 11, 2017.

Now, just because you’re running an OS that’s currently supported by Microsoft, doesn’t mean that your system is up to snuff. Microsoft only sends you the Windows updates and security patches; it’s up to you to apply them. If you don’t, then you’re leaving your system vulnerable.

It’s easy enough to apply Windows updates for your home PC, but it’s another thing entirely to apply Windows updates across all of your company’s workstations and server units, and verify that they’ve been applied correctly. Generally speaking, you will want an IT professional to assist you with this so that an update doesn’t interfere with a mission-critical application and cause downtown.

For assistance with all of your upgrading needs, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet IT Support Efficiency User Tips Malware Privacy Email Phishing Google Workplace Tips Computer Collaboration IT Services Users Hosted Solutions Mobile Device Ransomware Quick Tips Cybersecurity Workplace Strategy Small Business Microsoft Data Backup Communication Smartphone Saving Money Business Management VoIP Smartphones Android Mobile Devices communications Backup Data Recovery Passwords Managed IT Services Managed Service Upgrade Browser Social Media Microsoft Office Disaster Recovery Tech Term Network Internet of Things Remote Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Miscellaneous Gadgets Remote Work Server Managed Service Provider Windows Outsourced IT Current Events Productivity Information Encryption Spam Employee/Employer Relationship AI Holiday Windows 10 Data Management Business Continuity Compliance Government Office Windows 10 Virtualization Blockchain Wi-Fi Training Business Technology Bandwidth Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Chrome Managed Services Gmail Budget Voice over Internet Protocol Apple Networking App Employer-Employee Relationship Vendor Tip of the week Conferencing WiFi How To BDR BYOD Computing Hacker Applications Information Technology Avoiding Downtime Access Control Office 365 Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Big Data Managed IT Services Operating System HIPAA Computers Router Virtual Private Network Risk Management Website Marketing Health Help Desk IT Support Firewall Document Management Remote Workers Telephone The Internet of Things Scam Windows 11 Data loss 2FA Social Cooperation Free Resource Project Management Excel Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Solutions Cybercrime Display Printer Paperless Office Infrastructure Monitoring Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Managed IT Service Safety Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Entertainment Administration Supply Chain Vulnerabilities Images 101 Telephone System Multi-Factor Authentication Robot Mobility Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Hacking IT Management Presentation VPN Employees YouTube Meetings Physical Security Integration Cryptocurrency Data Privacy Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Data Storage Word Smart Technology SharePoint Addiction Workforce Electronic Medical Records Language Employer/Employee Relationships Threats Halloween Chatbots Navigation Refrigeration Management PCI DSS Public Speaking Lenovo Gig Economy Screen Reader Workplace Strategies Writing Distributed Denial of Service Lithium-ion battery Service Level Agreement Internet Service Provider Meta Virtual Reality Computing Infrastructure Teamwork Amazon Entrepreneur Scary Stories Private Cloud Identity Evernote Hacks Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Fun Deep Learning Download Net Neutrality Outsource IT Twitter Alerts SQL Server Environment Error History Media Undo Financial Data Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Upload Procurement Small Businesses Remote Computing Azure Displays Cyber security Multi-Factor Security Tech Mobile Computing Social Network Telework CES Tablet IoT Communitications Search Dark Web Application Best Practice Trends Supply Chain Management Outsourcing Alert Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term IBM Legal Data Analysis IT solutions Star Wars IT Assessment Workplace How To Microsoft Excel Notifications Staff Value Business Growth Gamification Flexibility Hiring/Firing Organization Travel Social Networking Paperless Legislation Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Co-managed IT Cortana Wearable Technology Memory Alt Codes Content Remote Working Technology Care Competition Health IT Downtime Unified Threat Management Motherboard Data Breach Business Communications Comparison Google Play Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Scams Permissions Wasting Time Typing Hybrid Work Trend Micro Human Resources Network Congestion Specifications Security Cameras Google Drive User Error Microchip User Internet Exlporer Software as a Service Cables Knowledge Fraud Managing Costs Username Point of Sale eCommerce Google Apps 5G Black Friday SSID IP Address Google Docs Unified Communications Database Surveillance IT Maintenance Experience Virtual Assistant Running Cable Tech Support IT Technicians Virtual Machine Bitcoin Network Management Business Intelligence Google Wallet Proxy Server Reviews Cookies Shortcuts Monitors Cyber Monday Medical IT Recovery Tactics Development Ransmoware Hotspot Transportation Vendors Laptop Websites Mirgation Hypervisor Hard Drives Windows 8 Domains Drones Shopping Nanotechnology Optimization Be Proactive PowerPoint

Blog Archive