Millions Still Use Windows 10 as Support Deadline Nears

▼ Summary
– A large number of users and organizations are still running Windows 10 just before its end-of-life date, creating cybersecurity risks.
– Windows 10 will stop receiving security updates after October 14, leaving systems vulnerable to unpatched exploits.
– Experts warn that continuing to use Windows 10 after support ends is highly risky, comparing it to leaving a door open for attackers.
– Microsoft and security agencies urge users to upgrade to Windows 11, which offers ongoing security updates and features.
– Users can check their device compatibility for Windows 11 or opt for Microsoft’s paid Extended Security Update program for temporary protection.
With the end of support for Windows 10 rapidly approaching, a substantial number of individuals and businesses continue to rely on the operating system, creating serious cybersecurity vulnerabilities. As the final deadline nears, these systems will no longer receive vital security patches, leaving them exposed to potential attacks.
Starting October 14, Microsoft will cease providing security updates or new features for Windows 10. This means any future software flaws discovered will remain unaddressed, turning these computers into easy targets for cybercriminals. Recent data from remote access provider TeamViewer indicates that more than 40% of global endpoints using their service still operate on Windows 10. A separate survey by UK consumer group Which? revealed that 26% of British Windows 10 users have no intention of upgrading after support ends, with another 11% remaining uncertain about their plans.
Microsoft strongly advises all Windows 10 customers to transition to Windows 11 before the cutoff date. The UK’s National Cyber Security Centre has echoed this recommendation, urging users to upgrade by October 11. The agency points to historical incidents where attackers exploited outdated systems, such as the 2017 WannaCry ransomware outbreak that crippled NHS operations across Britain.
Dr Yvonne Bernard, Chief Technology Officer at Hornetsecurity, describes the Windows 10 phase-out as a “security cliff edge” for companies still using the platform. She explains that organizations failing to upgrade risk losing Microsoft’s technical assistance, becoming more susceptible to malware infections, facing increased maintenance expenses, and potentially having cyber insurance claims rejected.
Security experts anticipate that malicious actors will intensify their focus on Windows 10 vulnerabilities once official support concludes. Charaka Goonatilake, CTO at Panaseer, compares continuing with Windows 10 after October to “leaving your front door wide open in a bad neighborhood.” He emphasizes that without updates, patches, or technical help, users become completely responsible for their own protection, with newly found security gaps remaining wide open for exploitation.
Microsoft emphasizes that Windows 11 developments guarantee users ongoing access to the most current security protections and technological advancements.
For individual users who haven’t yet upgraded, the initial step involves verifying whether their equipment meets Windows 11 specifications. This can be done by selecting the Start button, navigating to Settings > Update & Security > Windows Update, or utilizing the PC Health Check application. Upgrading requires specific hardware components including Trusted Platform Module (TPM) 2.0, Unified Extensible Firmware Interface (UEFI), and Secure Boot compatibility.
Those unable or unwilling to upgrade by the deadline can enroll in Microsoft’s Extended Security Update program for a single payment. This option provides critical security updates for Windows 10 on personal devices from October 15, 2025, through October 13, 2026.
Businesses need to begin by comprehensively mapping their Windows 10 usage across the organization, identifying which systems are running the software, who uses them, and for what purposes. The subsequent phase involves prioritizing upgrades, focusing first on high-risk systems while implementing additional protective measures where needed.
Goonatilake stresses that adopting this practical, evidence-based strategy enables security leaders to justify necessary investments. Companies can then determine which systems require immediate upgrading, which can be temporarily secured, and what degree of risk the organization can realistically tolerate.
(Source: Info Security)

