{"id":4052,"date":"2026-04-06T03:25:00","date_gmt":"2026-04-06T10:25:00","guid":{"rendered":"https:\/\/www.wiki-living.com\/index.php\/2026\/04\/06\/time-to-upgrade-the-report-warns-outdated-operating-systems-can-be-an-unnecessary-risk-your-business-has-forgotten\/"},"modified":"2026-04-07T03:09:49","modified_gmt":"2026-04-07T10:09:49","slug":"time-to-upgrade-the-report-warns-outdated-operating-systems-can-be-an-unnecessary-risk-your-business-has-forgotten","status":"publish","type":"post","link":"https:\/\/www.wiki-living.com\/index.php\/2026\/04\/06\/time-to-upgrade-the-report-warns-outdated-operating-systems-can-be-an-unnecessary-risk-your-business-has-forgotten\/","title":{"rendered":"Time to upgrade? The report warns outdated operating systems can be an &#8216;unnecessary risk&#8217; your business has forgotten"},"content":{"rendered":"\n<div id=\"article-body\">\n<hr id=\"elk-d364020b-04a9-455a-9e6b-84db15e30c60\"\/>\n<ul id=\"elk-f146e23f-ff26-45e7-8a91-b0dacd61ef57\">\n<li><strong>More than half of Macs and cell phones are installed with outdated software<\/strong><\/li>\n<li><strong>Attacks on macOS are increasing as Mac shipments increase, compounding the problem<\/strong><\/li>\n<li><strong>Software updates are designed to patch vulnerabilities<\/strong><\/li>\n<\/ul>\n<hr id=\"elk-c9969787-3171-4571-bce8-3285d55ffa6c\"\/>\n<p id=\"elk-16f6c5d2-c5b0-434a-9b68-df7716f5ab83\">Vulnerable apps and outdated apps can be a major security concern across Mac and mobile environments, says new research from Jamf.<\/p>\n<p>The firm found that more than half of organizations (53%) have mobile devices with severely outdated applications, and even more (58%) are running outdated macOS devices.<\/p>\n<aside data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" class=\"hawk-root\"\/>\n<p id=\"elk-16f6c5d2-c5b0-434a-9b68-df7716f5ab83-2\">As for the apps themselves, almost all (95%) of the mobile apps tested had at least one medium-sized vulnerability \u2013 combined with poorly protected operating systems, this could put sensitive company data at risk.<\/p>\n<p><span class=\"article-continues-below block py-2 text-sm\">The article continues below <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" class=\"inline-block w-2.5 h-2.5 ml-2\" fill=\"currentColor\" preserveaspectratio=\"xMidYMid meet\" viewbox=\"0 0 1000 1000\"><path d=\"M1000 100L500 900 0 100h1000z\"\/><\/svg><\/span><\/p>\n<aside data-component-name=\"Recirculation:ArticleRiver\" data-recirculation-type=\"inline\" data-mrf-recirculation=\"Trending Bar\" data-nosnippet=\"\" class=\"clear-both pb-0 pt-2 mb-4\">\n        <span class=\"&#10;            flex&#10;            after:content-[''] after:flex-1 after:ml-4 after:my-[0.7rem] after:border-t after:border-solid after:border-t-[#ccc]&#10;            before:content-[''] before:flex-1 before:mr-4 before:my-[0.7rem] before:border-t before:border-solid before:border-t-[#ccc]&#10;            font-article-heading pb-0 !text-base uppercase sm:text-sm font-bold&#10;        \"><\/p>\n<p>            You might like it<br \/>\n        <\/span><\/p>\n<\/aside>\n<h2 id=\"macos-and-mobile-are-major-culprits-for-running-dates-oss-3\">macOS and mobile are the biggest culprits for booting OSes<\/h2>\n<p id=\"elk-465588b3-e7c6-4a91-806e-e1ca852527cb\">Three in five mobile apps (62%) also ask for potentially dangerous permissions, with one in five (21%) showing &#8220;privacy-affecting behavior.&#8221;<\/p>\n<p>While the operating system or application itself may not be enough to send a company down, these vulnerabilities combined with human risks can spell disaster &#8211; a quarter of surveyed organizations have fallen due to phishing links that give attackers access to the system.<\/p>\n<p>Those weaknesses then enable coordinated movements within the company&#8217;s systems, amplifying the effects of the attack.<\/p>\n<p>Jamf also affects the evolution of threats, with many attacks now using zero-click, browser-based or encrypted attacks that do not require the active participation of the victim.<\/p>\n<div id=\"slice-container-newsletterForm-articleInbodyContent-kTb5s7ucateuTtEVY5jT79\" class=\"slice-container newsletter-inbodyContent-slice newsletterForm-articleInbodyContent-kTb5s7ucateuTtEVY5jT79 slice-container-newsletterForm\">\n<div data-hydrate=\"true\" class=\"newsletter-form__wrapper newsletter-form__wrapper--inbodyContent\">\n<div class=\"newsletter-form__container\">\n<section class=\"newsletter-form__top-bar\"\/>\n<section class=\"newsletter-form__main-section\">\n<p class=\"newsletter-form__strapline\">Sign up for the TechRadar Pro newsletter to get all the top news, ideas, features and guidance your business needs to succeed!<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<p>When it comes to Macs themselves, Apple has seen a 16.4% increase in shipments between 2024 and 2025 (via Omdia) \u2013 the biggest growth of any brand including Lenovo, HP, Dell and Asus. At the same time, more than 26,000 samples of macOS malware were found in 2025. According to the company&#8217;s research, nearly three-quarters (73%) of Macs now have at least one vulnerable operating system.<\/p>\n<p>&#8220;Our goal with this study is to spread awareness among security leaders about the risks affecting their organizations,&#8221; wrote Portfolio Strategy VP Michael Covington, &#8220;so they can ensure that threat detection, law enforcement and response capabilities are compatible with their Mac and mobile devices.&#8221;<\/p>\n<p>Although Jamf&#8217;s research centers around macOS and mobile, other operating systems (including Windows) are not immune to similar attacks, but thankfully one simple, trivial action can prevent a large number of attacks.<\/p>\n<p>Keeping apps and operating systems up to date isn&#8217;t just about handling bugs and introducing new features \u2013 it&#8217;s also removing vulnerabilities and bugs to increase security.<\/p>\n<hr id=\"elk-f46fd962-62fc-4af7-b21e-df595091f1a1\"\/>\n<p id=\"elk-cdd8e80c-0eee-49ee-a436-55c20a26cf98\"><em\/><em><strong>Follow TechRadar for Google news<\/strong><\/em>    again<em> <\/em><em><strong>add us as a favorite resource<\/strong><\/em><em>    to get our expert news, reviews, and opinions in your feed. Be sure to click the Follow button!<\/em><\/p>\n<p><em>And of course you can too <\/em><em><strong>follow TechRadar on TikTok<\/strong><\/em><em>    to get news, reviews, unboxings in video form, and get regular updates from us <\/em><em><strong>WhatsApp<\/strong><\/em><em>    again.<\/em><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>More than half of Macs and cell phones are installed with outdated software Attacks on macOS are increasing as Mac shipments increase, compounding the problem Software updates are designed to patch vulnerabilities Vulnerable apps and outdated apps can be a major security concern across Mac and mobile environments, says new research from Jamf. The firm [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4053,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[],"class_list":{"0":"post-4052","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-smart-home-gadgets"},"_links":{"self":[{"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/posts\/4052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/comments?post=4052"}],"version-history":[{"count":1,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/posts\/4052\/revisions"}],"predecessor-version":[{"id":4054,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/posts\/4052\/revisions\/4054"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/media\/4053"}],"wp:attachment":[{"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/media?parent=4052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/categories?post=4052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/tags?post=4052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}