
As a laptop or PC user, to remain safe and secure online in the modern world requires two approaches – the regular installation of security updates to patch any flaws in the operating system, in conjunction with a robust antivirus security product that provides protection against viruses and malware.
Provided both of these components are in place (and we users are sensible about what files we allow onto our PC’s or what links we click on) we remain to all intents and purposes “safe”. But what happens when the security updates are no longer available?
This month, our Windows 10 end-of-life article focusses on 2 key questions that IT professionals are being asked, with respect to the Windows 10 end of support in October 2025:
- What is meant by a “Zero day vulnerability”?
- Once support for Windows 10 ends, will antivirus software be enough for me to continue to use Windows 10 safely?
What is meant by a “Zero day vulnerability”?
A “zero-day vulnerability” refers to a security flaw in software, hardware, or firmware that is unknown to the vendor, manufacturer or developer. The term “zero-day” signifies that the developers have had zero days to address or patch the vulnerability since it was discovered and potentially exploited.
Here’s a breakdown of what that means:
- Undiscovered Flaw: The vulnerability exists in the code but hasn’t been found through regular testing or security audits by the creators.
- No Official Patch: Because the vendor isn’t aware of the flaw, there’s no security update or patch available to fix it.
- Exploitation Risk: Until a patch is released, malicious individuals can (and WILL) exploit this vulnerability to carry out cyberattacks, scams or ransoms. This is known as a zero-day exploit or zero-day attack.
Think of it like a secret, unlocked backdoor in a house that the homeowner doesn’t know about. A thief who discovers this backdoor can enter the house and cause damage or steal belongings before the homeowner even realizes there’s a problem.
Key aspects of zero-day vulnerabilities:
- Severity: They pose a significant security risk because there are no immediate defences available.
- Detection Difficulty: Traditional security tools that rely on known virus or code signatures often can’t detect attacks exploiting zero-day vulnerabilities.
- High Value: Information about zero-day vulnerabilities and working exploits can be highly valuable and are often traded in criminal underground markets or acquired by government agencies.
- Limited Timeframe: Once a zero-day vulnerability becomes public knowledge, there’s a race against time for vendors to create and release a patch before widespread exploitation occurs – PROVIDED THE OPERATING SYSTEM IS BEING SUPPORTED.
Examples of well-known zero-day attacks include:
- Stuxnet (2010): A sophisticated worm that exploited four zero-day vulnerabilities in Microsoft Windows to target Iran’s nuclear program.
- Sony Pictures Entertainment attack (2014): Attackers used a zero-day exploit to cripple Sony’s network and leak sensitive data.
- Log4Shell (2021): A critical zero-day vulnerability in a widely used programming component, allowing hackers to run malicious software remotely.
- Kaseya VSA attack (2021): Ransomware attackers exploited a zero-day vulnerability in remote management software operated by an IT Services company named Kaseya, resulting in malware being delivered to over 1,000 of Kaseya’s customers.
While completely preventing zero-day vulnerabilities is nearly impossible due to the complexity of modern software, organisations can take proactive steps to mitigate the risk, such as:
- Robust Patch / Update Management: Applying security patches promptly when they become available reduces the window of opportunity for exploiting known vulnerabilities.
- Behavioural Analysis and Anomaly Detection: Security solutions that monitor system behaviour for unusual activity can sometimes detect zero-day exploits even without specific signatures. Some antivirus solutions use this technology.
- Endpoint Detection and Response (EDR): EDR solutions can help detect and respond to suspicious activities on endpoints (computers, laptops, etc.) that might indicate a zero-day exploit.
- Principle of Least Privilege: Limiting user and application privileges can reduce the potential damage if a zero-day exploit is successful. In other words, ensuring that regular IT users DO NOT log in as an administrator!
- Network Segmentation: Isolating critical systems can prevent the lateral spread of an attack exploiting a zero-day vulnerability.
- Web Application Firewalls (WAFs): WAFs can help protect web applications from various attacks, including some zero-day exploits targeting web-based vulnerabilities.
- Zero Trust Architecture: Implementing a security model that assumes no user or device is inherently trustworthy can limit the impact of a successful exploit.
Once support for Windows 10 ends, will antivirus software be enough for me to continue to use Windows 10 safely?
While antivirus software offers a layer of protection against malware and other threats, it will not be sufficient to keep your Windows 10 system secure after Microsoft ends support on October 14, 2025.
Here’s why:
- End of Security Updates: The most critical aspect of the end of support is that Windows 10 will no longer receive security updates. These updates are crucial because they patch newly discovered vulnerabilities in the operating system itself. Without them, your computer becomes increasingly susceptible to attacks as hackers find and exploit these unpatched flaws.
- Antivirus Limitations: Antivirus software primarily detects and removes malicious software that tries to run on your system. It relies on a database of known threats and behavioural analysis. However, it cannot protect against vulnerabilities in the underlying operating system code. If a hacker exploits a zero-day vulnerability (a flaw unknown to Microsoft), they can potentially bypass the antivirus software entirely and gain access to your system.
- Evolving Threats: Cyber threats are constantly evolving. New and sophisticated malware and attack techniques emerge regularly. Security updates for the operating system often include defences against these new threats, which your antivirus alone won’t be able to provide.
- Application Compatibility: Over time, software developers may stop supporting older, unsupported operating systems like Windows 10. This could lead to compatibility issues with newer versions of applications, potentially forcing you to use outdated and potentially vulnerable software.
- No New Features or Improvements: Besides security updates, you will also miss out on any new features, performance improvements, and bug fixes that Microsoft releases for supported versions of Windows.
Think of it this way: Antivirus software is like having a good lock on your door. However, if the foundation of your house (Windows 10) has structural weaknesses that are never fixed, a determined intruder might find a way to bypass the lock entirely.
What are your options when Windows 10 support ends?
- Upgrade to Windows 11: If your computer meets the minimum hardware requirements, upgrading to Windows 11 is the most recommended and secure option. It will continue to receive regular security updates and new features. You can check your PC’s compatibility using Microsoft’s PC Health Check app or contact an IT support organisation such as Magikos IT to assist with auditing your IT equipment.
- Purchase Extended Security Updates (ESU): Microsoft is offering an Extended Security Updates (ESU) program for Windows 10 for a limited time. This paid program will provide critical and important security updates for a maximum of three years. For personal users, the ESU program will be a one-year option priced at $30 USD, with enrolment becoming available closer to the end of support in October 2025. Keep in mind that this is a temporary solution and can become costly over time.
- Consider a Different Operating System: You could consider switching to a different operating system like Linux, which is open-source and has a strong security focus with regular updates. However, this might require some technical knowledge and familiarization.
- Replace Your Hardware: If your current computer is not compatible with Windows 11 and you don’t want to use an unsupported OS, you may need to consider purchasing a new computer with a supported operating system.
In conclusion, relying solely on antivirus software after Windows 10 reaches its end of support is not a safe practice and will leave your system vulnerable to security threats. It is highly recommended to upgrade to a supported operating system or consider other secure alternatives.
NOT protecting yourself online is a serious risk – whether you are a home user or a business user. The financial and legal stakes are far too high!
For Further Information or advice, please contact the Magikos IT Team or fill in the form below and we will contact you.
Tel: 01344 204019
Email: info@magikos.co.uk