[ad_1]
First we buy a gadget. Over the next few years, the manufacturer releases an occasional software update that fixes bugs and protects us from vulnerabilities. One day, these updates will stop coming. According to conventional wisdom, this time to buy a new device.
But what if it isn’t?
The truth is, upgrades don’t have to be so automatic. If we follow some security best practices and take control of our personal technology, we can usually delay them. After all, it’s not realistic for everyone to upgrade on a tech company’s schedule – some devices, including expensive Android phones, stop receiving software updates after just two years. Not all of us have the time or money to buy new products on a regular basis.
At the same time, we don’t want to keep our gadgets so long that they become vulnerable to bugs, cyber attacks, and other flaws. Software upgrades are often required for these reasons. Everyone needs to be able to safely use technology to live and work, said Hilary Shohoney, managing director of Free Geek, a nonprofit that reuses outdated machinery for schools and the elderly.
“We have to walk the line between recognizing what reality is for many people and recognizing that everyone should be interested in the digital world,” he said. “It’s not fair to say you need the best computer to get the best security.”
So how do we walk this line? While eventually a new gadget will need to be purchased, there are some ways to keep your devices running safely even if the firmware stops providing updates. Here’s what you need to know.
Follow Security Best Practices
Think about how we use technology today. On computers, much of what we do, from handing in homework to editing spreadsheets, happens via a web browser. On phones, we rely heavily on both the web and apps.
Therefore, staying safe online without direct assistance from a manufacturer involves largely the steps of surfing the web and using apps. Here are some things to watch out for:
-
Keep your browser up to date. Keeping a close eye on browser updates will provide some protection against malicious websites. Trusted browser companies such as Mozilla, the maker of Firefox, update their apps to run on computers older than 10 years.
-
As always, avoid suspicious behavior. Don’t open messages or click on links from unknown senders, and if possible only use apps from trusted brands, said Sinan Eren, manager of Barracuda Networks, a security firm.
-
Be on the lookout for shady apps. Android devices are more susceptible to malware than Apple phones, in part because they can be set up to install apps from unauthorized app stores. Also, many manufacturers stop supporting Android devices after just two years. Google declined to comment. Owners of older Android devices can add a layer of protection by installing malware scanning apps from brands like Malwarebytes, NortonLifeLock, and Lookout.
-
Secure your online accounts. Even if your device software is outdated, setting up your online accounts with two-factor authentication (a security app that generates a unique code via an app or text message every time you log into a site) can help prevent inappropriate access to your account. in case your password is stolen.
Doing all of the above will reduce the risk, but not eliminate it. Dan Guido, CEO of Trail of Bits, an internet security company, said that legacy devices remain open to attackers due to known vulnerabilities in legacy software.
“Unsupported devices are a fixed target for attackers – a sitting duck -” he said.
Install a Different Operating System
There are more advanced steps that can keep a device functional and safe for its supported life. One involves replacing the manufacturer’s software system with an alternative.
Miss Shohoney’s Portland, Ore. Based non-profit organization Free Geek is reviving old PCs by installing a copy of Linux, the open-source operating system known for strong security and used for basic tasks such as browsing the web, exchanging email, and creating. documents.
Installing a different operating system requires some technical knowledge, but numerous resources and online tutorials offer step-by-step instructions for adding Linux to older versions. Windows and Mac machines.
Smartphone owners have fewer options. for Android, LineageOS, An open-source mobile operating system received positive reviews for its robust security.
But old Apple mobile devices cannot be easily modified to install an alternative operating system. In fact, security experts do not recommend “jailbreaking” or injecting unauthorized software, as it can weaken the security of the Apple device.
Repurpose Your Old Device
We can also take steps with our hardware, such as replacing an aging battery, to keep our devices working. But when time, cost, effort, and risk combine to make it impractical to revive a device, upgrading is your best bet.
That doesn’t mean we have to take our devices to a recycling center. For example, by turning off an old iPad’s internet connection, you can safely use it for light tasks like playing music or typing in recipes, said Kyle Wiens, CEO of iFixit, a company that provides tools and instructions for repairing tech products.
“If it’s not networked, it doesn’t matter if it’s outdated,” he said.
[ad_2]
Source link
