Why operating system (OS) updates are important

Many users turn to Proton to secure their most sensitive information. Your security is our number one priority, and we employ advanced encryption in all our apps to ensure that your personal data cannot be exposed by malicious actors. 

However, Proton apps, like all apps, rely on the security of your operating system (OS) to function. If your device’s operating system is compromised, all apps running on your device are also likely compromised.

Keeping your operating system updated is a cornerstone of keeping your data secure. Regular system updates and the security patches they provide are the first line of defense against hackers, yet many people neglect this basic but vital aspect of security housekeeping. 

Estimates suggest that, for example, almost a year after all support for Windows 7 ended in January 2020, some 100 million people(yeni pencere) were still using the obsolete operating system. 

In this article, we explain why keeping your operating system up-to-date is so important.

Learn how to update your device’s operating system(yeni pencere)

What is an operating system?

An operating system manages a device’s hardware and core software programs and also provides common services that allow you to download, install, and run other applications. Most modern operating systems also provide a graphic user interface (GUI) to make interacting with the OS and applications that run on it easy for the end user. 

Most devices are sold with an OS already pre-installed (like iOS on iPhones or Windows on most laptops), but it is possible to install one yourself (for example, installing Linux on a custom-built PC or to replace an existing Windows installation). 

Your device, be it a tablet, smartphone, or desktop computer, would not be able to function without its OS, and all third-party software that runs on your device also relies on the OS to function properly. 

Operating systems need updates to stay secure

All operating systems are, by their very nature, hugely complex. Among the millions of lines of code that make up an OS, there are inevitably mistakes, unforeseen interactions between subsystems, or any number of other flaws. If a device doesn’t connect to the internet, this might never be a problem. But the second it does, hackers can potentially take advantage of these flaws to compromise your system.

Operating system developers such as Apple, Google, and Microsoft spend a great deal of time and resources trying to find and fix these flaws. These fixes come in the form of security updates. 

When developers release a new version of an OS, it should contain fixes for all known flaws. However, it is only a matter of time before new flaws are discovered, be they legacy flaws that no one noticed before or new vulnerabilities created as a result of new features implemented in the most recent update.

You therefore need to constantly update your OS to stay secure. The longer you put it off, the more unpatched flaws it will contain, and the more unpatched flaws your OS contains, the more likely it is that a hacker will discover one of them and use it to wreck your system or steal your data. 

Any system is only as secure as its weakest point, so if your operating system is insecure, all your apps are likely insecure.

New updates also introduce new features

OS developers continually tweak, improve, and add features to their platforms. Smaller incremental improvements are routinely released alongside security patches in the form of system updates, and when major improvements are made, a new version of the OS is released. 

Security is by far the most important reason to keep your system updated, but another reason is that new features introduced by system updates allow third-party developers such as Proton to provide a better service for our users. Older systems lack functions and features that are required by our apps to deliver the high-end features you have come to expect. 

Why operating systems become obsolete

All software will become obsolete one day. Eventually, new technological advances or new cyberthreats make it too costly to continue with pre-existing code, and developers will start over.  

As we improve our software to make it more secure and offer greater functionality, it becomes increasingly costly to support obsolete operating systems whose codebase is increasingly different from the latest versions. 

Once an OS developer stops releasing security patches for their OS, that OS must be considered fundamentally insecure. The longer an OS has been deprecated, the more difficult it is for developers to continue making secure apps for it, and we can no longer guarantee continued support for it. We will notify users whenever we are about to stop supporting apps on an outdated OS.

For example, Proton Mail(yeni pencere) is deprecating support for Internet Explorer because Microsoft is deprecating(yeni pencere) support for it.

Small, simple steps, like making sure you are using the most recent version of your OS, can have a profound effect on improving your device’s security. This, in turn, makes it easier for you to protect your privacy.  

İlgili makaleler

How to fix a 502 error
en
In this article, we explain what a 502 bad gateway error is and explore possible ways to fix it as a visitor to a website.
Watch Thanksgiving Day football with Proton VPN
en
Here's how you can live stream this year's Thanksgiving football games using Proton VPN, whether you're watching from home or abroad.
Where to watch Macy's Thanksgiving day parade
en
Here's how and where to watch Macy's Thanksgiving Day Parade live from anywhere in the world with Proton VPN.
What we've been up to, and what's next
en
Here are the main things Proton VPN delivered this spring and summer and the exciting changes that lie ahead on our product roadmap this winter.
Proton VPN for Windows ARM
en
  • Proton VPN haberleri
We’re pleased to announce a new Proton VPN app with native support for Windows devices that use the ARM chipset.
What is doxing and is doxing illegal
en
  • Gizliliğin temel prensipleri
We look at what doxing is, who does it (and why), and at how to protect yourself from doxing .