Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Are the Last Days of Windows 7

These Are the Last Days of Windows 7

Microsoft is just days away from retiring not just one, but two of its most popular operating systems. The software giant has made a point to run a major campaign warning people who are still using Windows 7 that they are going to lose support after the January 14, 2020 deadline; but, as of this writing, there are still over a quarter of desktop users running the software. With the deadline looming, we thought we’d look at what this means for users and go through some of the options they have.

If you are still using Windows 7, the first thing that you should know is that when the support date passes, you will still be able to use the software. The main issue is that it will no longer receive critical software patches and routine updates. Over time, this could degrade the functionality of the software, but the real issue is that the computer running the software, and any network that the computer is connected to, will not be secure. 

Sure you can do other things to protect your network such as isolate machines running Windows 7 from the rest of your network--especially if your business needs that platform to continue running line-of-business applications--but, regardless of how you go about it, no steps will protect you from all unpatched vulnerabilities besides actually taking these systems offline. If you understand the risks, you know it is in your best interest, and the best interest of your organization, to have a plan to retire these systems as soon as possible.

What Are Your Options?

You have several options, even now, when it comes to getting out in front of a potentially problematic situation. They include:

Upgrade systems to Windows 10 

This one seems like a no-brainer. The minimum specifications that it takes to run Windows 10 isn’t much more than it takes to run Windows 7. Here are the specs your computer will need:

  • Processor - 1 GHZ or faster
  • RAM - 1 GB for 32-bit or 2 GB for 64-bit
  • Hard disk space - 16 GB for 32-bit or 20 GB for 64-bit
  • Graphics card - DirectX 9 or later with WDDM 1.0 driver
  • Display - 800 x 600 resolution

Obviously, these are the minimum specifications so don’t expect any computer with these specs to be very fast. We recommend at the very least that you have some type of 2 GHz dual-core processor, 4-to-8 GB of RAM, and at least a 160 GB hard drive if you do plan on upgrading. 

Replace Hardware Systems

This one is, by far, the most expensive option, but it may be the easiest to implement as time is basically up. With this option you would have all new hardware which would come with Windows 10 installed. It may take some time to configure your new hardware with your line-of-business software, but at least you would get regular Windows 10 updates. 

Shift to ChromeOS

One option that some businesses are choosing to deploy is using Chromebooks in lieu of new Windows workstations. Sure, they are typically more cost effective, but there are some issues, namely that any line-of-business applications have to be virtualized in order to run. Since ChromeOS devices require Internet access, this can bog down some productivity. The end result may be pretty attractive for your business, and for your IT staff, but it will be a major shift that may cause overhead to actually rise. 

Virtualize and Use a Thin Client

This is much like the Chromebook option, but instead of buying all new hardware, you can repurpose your old hardware to act as thin clients. Again, virtualizing may be a great option for your organization, but with the limited timeline, it may be impossible to ensure that your data is protected before the deadline. 

Microsoft is offering a service called Microsoft 365 that could make this transition a little easier. For a flat rate billed per user, you can get Windows 10, Office 365 with a terabyte of OneDrive cloud storage, and dynamic security software that can be accessed through any Internet browser. If you have teams of workers that only need access to productivity software, you could do much worse than this cloud-based option. 

Regardless of which option you decide to choose, it is imperative that your organization finds a solution for the Windows 7 problem. If you would like to talk about your options, call the IT professionals at Voyage Technology today at 800.618.9844, and we can assess your situation and help you upgrade away from Windows 7 and find an option that will work for your company.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 30 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Computer Email Workplace Tips Phishing Hosted Solutions IT Services Collaboration Users Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Passwords Communication Data Backup Saving Money Smartphone Backup Android Managed Service Business Management VoIP Smartphones communications Upgrade Mobile Devices Disaster Recovery Browser Data Recovery Microsoft Office Windows Managed IT Services Social Media Remote Tech Term Current Events Network Productivity Internet of Things Automation Artificial Intelligence Facebook Holiday Gadgets AI Cloud Computing Covid-19 Remote Work Server Managed Service Provider Miscellaneous Outsourced IT Information Training Employee/Employer Relationship Compliance Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology IT Support Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps Mobile Device Management Chrome Gmail Managed Services Budget Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Tip of the week Conferencing WiFi How To BDR HIPAA Computers Router Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Operating System Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring 2FA Excel Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Customer Service Cybercrime Presentation VPN Employees YouTube Meetings Integration Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays Data storage LiFi Data Storage Word Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Managed IT Service Safety Maintenance Antivirus Sports Downloads Mouse iPhone Licensing Entertainment Administration Vulnerabilities Data Privacy Images 101 Telephone System Multi-Factor Authentication Robot Mobility Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Hacking IT Management Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Knowledge Fraud Meta Google Drive User Error Microchip User Internet Exlporer Software as a Service Username Managing Costs Amazon Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Outsource IT IP Address Google Docs Unified Communications Database Surveillance Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Media Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Recovery Tactics Development Hard Drives Windows 8 Laptop Websites Mirgation Hypervisor Displays Domains Drones Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Refrigeration Management PCI DSS Halloween Chatbots Navigation Public Speaking Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Lithium-ion battery Service Level Agreement Internet Service Provider Hacks Server Management Regulations Compliance Entrepreneur Scary Stories Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Fun Co-managed IT Twitter Alerts SQL Server Technology Care Deep Learning Download Net Neutrality Undo Financial Data Error History Business Communications Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Upload Procurement Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Search Dark Web Cables Alert Application Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps IBM Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Organization Travel Social Networking Legislation Shortcuts Cortana Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Vendors Competition Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Wasting Time Threats

Blog Archive