Windows 7|Windows 8

About 20% of Internet Explorer Users Will Be Using Unsupported Software Starting This Week

Internet Explorer Hero

This week will mark the end of a dark time for Internet Explorer, as versions 8, 9, and 10 will no longer be supported after tomorrow. This means that if you are running the legacy browser, it is time to upgrade to make sure your machine is protected from external threats.

For web developers, older versions of Internet Explorer, especially 8 and 9, have been a burden to support as they require unique attributes to make a page display correctly when compared to other browsers like Chrome, Firefox, or even Internet Explorer 10 and 11.

If you are running Windows Vista, Internet Explorer 9 will still be supported, but it will not receive updates on any other version of Windows.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

With a patch that should be released tomorrow, Microsoft will deliver the final security updates to the browser and with about 20 percent of Internet Explorer users browsing with a soon-to-be unsupported version of the software, according to Net Applications, this becomes a large target for malicious groups. If you are using one of the impacted browsers, Microsoft recommends that you upgrade to IE 11; alternatively, you can download Chrome or Firefox.

(Image Credit: Net Applications)
Internet Explorer usage. (Image Credit: Net Applications)

Microsoft has faced stiff competition from Google and Mozilla with their browsers, Chrome and Firefox respectively, but for desktop users, Internet Explorer still owns about 48 percent of the market, according to Net Applications.

Internet Explorer, as a brand, has a long and interesting history of beating out juggernauts like Netscape but then becoming a victim of its own success. Microsoft stopped aggressively building new features for the browser after Internet Explorer 6 was released, which allowed Firefox and Chrome to slowly eat away at the company’s marketshare. The slow development cycle of the browser also permanently tarnished its reputation as developers were forced to support Microsoft’s specific browser instead of industry standards, which created additional workload.

The stigma around Internet Explorer became so entrenched that the company has abandoned the name and is now using Edge, which is a heavily-reworked version of Internet Explorer, and it’s the default browser in Windows 10. But this new browser is not off to a great start as many users report frequent crashes, and it is also missing basic features like extensions.

If you do find that your corporate machine is running an older version of Internet Explorer, it’s likely best to give your IT admin a friendly poke to let them know that their network is about to become vulnerable this week. More importantly, running any of these versions of the browser should now show up on an IT based risk-assessment too.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Brad Sams has more than a decade of writing and publishing experience under his belt including helping to establish new and seasoned publications From breaking news about upcoming Microsoft products to telling the story of how a billion dollar brand was birthed in his book, Beneath a Surface, Brad is a well-rounded journalist who has established himself as a trusted name in the industry.
External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: