{"id":112316,"date":"2025-06-20T11:54:33","date_gmt":"2025-06-20T03:54:33","guid":{"rendered":"https:\/\/version-2.com\/?p=112316"},"modified":"2025-06-19T16:48:11","modified_gmt":"2025-06-19T08:48:11","slug":"outdated-software-a-ticking-bomb-in-backups","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/06\/outdated-software-a-ticking-bomb-in-backups\/","title":{"rendered":"Outdated Software &#8211; A Ticking Bomb in Backups"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"112316\" class=\"elementor elementor-112316\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06f0808 post-content elementor-widget elementor-widget-text-editor\" data-id=\"06f0808\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"news__content mt-5\"><p data-start=\"202\" data-end=\"343\">Updating software is one of the simplest and most effective ways to protect data. Unfortunately, many companies postpone or ignore this task.<\/p>\n<p data-start=\"345\" data-end=\"807\">In recent months, many vulnerabilities have been discovered and actively exploited in storage and backup solutions. These include tools such as Veeam Backup &amp; Replication, MinIO, Veritas Backup Exec, Arcserve UDP, Rubrik CDM, Nakivo, QNAP QuTS Hero OS, and Pure Storage FlashArray and FlashBlade. Notably, some of the vulnerabilities in the latter were rated as a CVSS 10\u2014requiring immediate action. Yet many companies still don\u2019t take update warnings seriously.<\/p>\n<p data-start=\"345\" data-end=\"807\"><img fetchpriority=\"high\" fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-19384 entered loading\" src=\"https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1.png\" alt=\"\" width=\"1200\" height=\"630\" srcset=\"https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1.png 1200w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1-57x30.png 57w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1-143x75.png 143w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1-250x131.png 250w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1-340x179.png 340w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1-479x250.png 479w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1-767x403.png 767w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" data-ll-status=\"loading\"><\/p>\n<p data-start=\"809\" data-end=\"1593\">Protecting sensitive and confidential data is a top priority for most CIOs. TLS encryption for internet-transmitted messages, AES-256 for data at rest, multi-factor authentication, and zero trust policies are commonly used. However, regular software updates and patching vulnerabilities are discussed far less. Experts agree that outdated software is a ticking bomb. Hackers closely monitor security patch release dates to exploit vulnerabilities in older system versions. Many users fail to follow vendor recommendations or delay updates, creating ideal attack conditions. The best-known example is <a href=\"https:\/\/storware.eu\/blog\/what-is-ransomware-definition-examples-and-prevention\/\"><span style=\"text-decoration: underline;\"><strong data-start=\"1409\" data-end=\"1421\">WannaCry<\/strong><\/span><\/a>, one of the largest ransomware attacks in history. In May 2017, it infected over 300,000 computers in 99 countries, despite Microsoft releasing a patch two months earlier.<\/p>\n<p data-start=\"1595\" data-end=\"1771\">Think of software updates like car maintenance\u2014even the best vehicle will break down without regular oil changes, and worn brake pads will eventually damage the braking system.<\/p>\n<p data-start=\"1773\" data-end=\"2166\">Similarly, not updating applications will sooner or later lead to data security breaches and reduced performance. For businesses handling sensitive customer data\u2014such as accounting firms or financial institutions\u2014this could mean financial losses, reputation damage, or even bankruptcy. According to research by <a href=\"https:\/\/www.ninjaone.com\/blog\/smb-cybersecurity-statistics\/\"><span style=\"text-decoration: underline;\">NinjaOne<\/span><\/a>, <strong data-start=\"2094\" data-end=\"2165\">57% of data breaches could have been prevented with regular updates<\/strong>.<\/p>\n<h2 id=\"hitting-the-last-line-of-defense\">Hitting the Last Line of Defense<\/h2>\n<p data-start=\"2214\" data-end=\"2710\">While there has been progress in updating OSes and antivirus tools, <strong data-start=\"2282\" data-end=\"2341\">storage systems and backup software are still neglected<\/strong>. Why? For years, backups weren\u2019t a primary target for hackers. That changed with the rise of ransomware. IDC reports that over <strong data-start=\"2469\" data-end=\"2521\">half of ransomware attacks target backup systems<\/strong>, and <strong data-start=\"2527\" data-end=\"2542\">60% succeed<\/strong>. Veeam\u2019s 2024 Ransomware Trends Report reveals that <strong data-start=\"2595\" data-end=\"2647\">backup repositories are attacked in 96% of cases<\/strong>, and <strong data-start=\"2653\" data-end=\"2701\">cybercriminals successfully interfere in 76%<\/strong> of them.<\/p>\n<p data-start=\"2712\" data-end=\"3273\">Hackers know that backups are a company\u2019s last resort. That\u2019s why they increasingly encrypt or delete them\u2014limiting recovery options and forcing victims to pay ransoms. Compromising backups threatens business continuity. And ransomware attacks aim not just for extortion, but also to disrupt operations and cause financial harm. Victims with compromised backups are in a weaker negotiation position. According to Sophos, companies whose backups were encrypted paid on average <strong data-start=\"3188\" data-end=\"3205\">twice as much<\/strong>\u2014a median ransom of <strong data-start=\"3225\" data-end=\"3242\">$2.3M vs. $1M<\/strong> for those with intact backups.<\/p>\n<p data-start=\"3275\" data-end=\"3690\">Ransomware uses various infection vectors: phishing, remote access (RDP), and exploiting software vulnerabilities\u2014often due to missed updates. Whether it\u2019s a backup application or an operating system, unpatched software is a gateway. For example, <strong data-start=\"3522\" data-end=\"3546\">Veeam CVE-2024-40711<\/strong> was exploited by groups like Monti and Yanluowang. Similarly, <strong data-start=\"3609\" data-end=\"3627\">CVE-2023-27532<\/strong> was used by EstateRansomware to attack corporate environments.<\/p>\n<h3 data-start=\"1665\" data-end=\"1715\">Real-world impact stories stick<\/h3>\n<p data-start=\"1719\" data-end=\"1967\"><strong>Example: <\/strong>In 2023, a mid-sized logistics firm lost all customer data after its backup server running an outdated version of Nakivo was compromised. Despite having backups, the encryption rendered recovery impossible\u2014and the company paid over $1.5M in ransom.<\/p>\n<h2 id=\"updating-backup-software-more-than-just-security\">Updating Backup Software = More than Just Security<\/h2>\n<p data-start=\"3756\" data-end=\"4044\">The backup and disaster recovery (DR) market is evolving rapidly. Vendors regularly release new solutions or update existing ones. While security is key, it\u2019s not the only reason to stay current. Over time, backup tools become <strong data-start=\"3983\" data-end=\"3999\">incompatible<\/strong> with newer OSes, hardware, and applications.<\/p>\n<p data-start=\"4046\" data-end=\"4374\">Updated backup software often includes <strong data-start=\"4085\" data-end=\"4113\">performance improvements<\/strong>\u2014faster backups and restores, better resource usage, and support for large datasets. These enhancements reduce downtime and boost operational efficiency. Updates may also bring new <strong data-start=\"4294\" data-end=\"4320\">data recovery features<\/strong>, like instant VM recovery or cross-platform restores.<\/p>\n<p data-start=\"4376\" data-end=\"4682\">While backup expenses can be high, proper updates can help <strong data-start=\"4435\" data-end=\"4451\">reduce costs<\/strong>. New versions often include deduplication, compression, and other optimizations\u2014cutting storage needs and data transfer times. This reduces storage expenses and speeds up backup processes, lightening the load on IT infrastructure.<\/p>\n<p data-start=\"4684\" data-end=\"4959\">Another major challenge for IT departments is <strong data-start=\"4730\" data-end=\"4755\">regulatory compliance<\/strong>. Many industries are bound by strict data protection laws. Updated backup software often includes features that support compliance\u2014such as data retention policies, audit logs, and reporting capabilities.<\/p>\n<h2 id=\"summary-table\">Summary Table<\/h2>\n<table style=\"border-style: solid;\" border=\"1\" cellspacing=\"1\" cellpadding=\"5\">\n<thead>\n<tr>\n<th>Threat Factor<\/th>\n<th>Impact<\/th>\n<th>% of Cases<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Backup targeted in ransomware<\/td>\n<td>High data loss risk<\/td>\n<td>96%<\/td>\n<\/tr>\n<tr>\n<td>Successful attack on backup<\/td>\n<td>Company forced to pay ransom<\/td>\n<td>76%<\/td>\n<\/tr>\n<tr>\n<td>Data breaches preventable by patching<\/td>\n<td>Could have been avoided<\/td>\n<td>57%<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"a-dozen-security-gaps-on-average\">A Dozen Security Gaps on Average<\/h2>\n<p data-start=\"5007\" data-end=\"5460\">The average enterprise storage or backup device has <strong data-start=\"5059\" data-end=\"5090\">14 security vulnerabilities<\/strong>, including <strong data-start=\"5102\" data-end=\"5137\">three rated as high or critical<\/strong>. These findings come from Continuity\u2019s <em data-start=\"5177\" data-end=\"5227\">State of Storage and Backup Security Report 2023<\/em>, based on an analysis of 245 environments covering 8,589 devices from vendors like Dell, NetApp, Veritas, and Hitachi Vantara. Most participating organizations were in banking, but also included healthcare, telecom, and IT services.<\/p>\n<p data-start=\"5462\" data-end=\"6016\">Properly securing storage systems will soon be <strong data-start=\"5509\" data-end=\"5575\">a core component of organizational cyber resilience strategies<\/strong>. Business users should not only wait for vendor updates but also adopt <strong data-start=\"5647\" data-end=\"5670\">proactive practices<\/strong>, such as vulnerability scanning. That\u2019s why interest is growing in <strong data-start=\"5738\" data-end=\"5788\">Application Security Posture Management (ASPM)<\/strong> tools, which provide real-time system security monitoring. Industry regulations increasingly require automated vulnerability management. For instance, <strong data-start=\"5940\" data-end=\"5956\">PCI DSS v4.0<\/strong> mandates the use of automated vulnerability scanning tools.<\/p>\n<p data-start=\"6018\" data-end=\"6157\">In short, protecting storage and backup systems is no longer just about security\u2014it\u2019s also about <strong data-start=\"6115\" data-end=\"6156\">compliance and operational efficiency<\/strong>.<\/p>\n<h2 id=\"practical-checklist-how-to-secure-your-backup-systems-today\">Practical Checklist: How to Secure Your Backup Systems Today<\/h2>\n<ul>\n<li data-start=\"402\" data-end=\"452\">Audit all backup and storage software versions \u2705<\/li>\n<li data-start=\"457\" data-end=\"513\">Apply the latest vendor patches and security updates \u2705<\/li>\n<li data-start=\"518\" data-end=\"577\">Implement multi-factor authentication for backup access \u2705<\/li>\n<li data-start=\"582\" data-end=\"626\">Regularly test backup restore procedures \u2705<\/li>\n<li data-start=\"631\" data-end=\"669\">Enable immutability and encryption \u2705<\/li>\n<li data-start=\"674\" data-end=\"729\">Use vulnerability scanners on backup infrastructure \u2705<\/li>\n<li data-start=\"734\" data-end=\"795\">Isolate backup systems from the main production environment \u2705<\/li>\n<\/ul>\n<h2 id=\"consequences-of-not-updating-backup-software\">Consequences of Not Updating Backup Software<\/h2>\n<ul>\n<li data-start=\"6220\" data-end=\"6350\"><strong data-start=\"6220\" data-end=\"6254\">Increased risk of cyberattacks<\/strong> \u2013 unpatched systems are open doors for hackers to access sensitive data and critical resources.<\/li>\n<li data-start=\"6355\" data-end=\"6456\"><strong data-start=\"6355\" data-end=\"6387\">Decreased system performance<\/strong> \u2013 outdated software often runs slower, driving up operational costs.<\/li>\n<li data-start=\"6461\" data-end=\"6586\"><strong data-start=\"6461\" data-end=\"6500\">Incompatibility with new technology<\/strong> \u2013 older apps may not work with modern hardware or OSes, causing functionality issues.<\/li>\n<li data-start=\"6591\" data-end=\"6742\"><strong data-start=\"6591\" data-end=\"6620\">Regulatory non-compliance<\/strong> \u2013 many industries have strict data protection laws. Using outdated software can result in fines or loss of certification.<\/li>\n<\/ul>\n<p data-start=\"734\" data-end=\"795\">Updating your backup software isn\u2019t just a matter of maintenance\u2014it\u2019s a critical element of business continuity, compliance, and cybersecurity resilience. Don\u2019t let outdated tools be your weakest link.<\/p>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 post-content elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"83046\" class=\"elementor elementor-83046\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f508312 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1f508312\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5d0a9f4a\" data-id=\"5d0a9f4a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1aff8842 elementor-widget elementor-widget-text-editor\" data-id=\"1aff8842\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Storware<br \/><\/strong>Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Updating software is one of the simplest and most effec [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1291,1305,61],"tags":[1077,1292],"class_list":["post-112316","post","type-post","status-publish","format-standard","hentry","category-storware","category-1305","category-press-release","tag-1077","tag-storware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Outdated Software - A Ticking Bomb in Backups - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Outdated Software - A Ticking Bomb in Backups - Version 2\" \/>\n<meta property=\"og:description\" content=\"Updating software is one of the simplest and most effec [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-20T03:54:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/outdated-software-a-ticking-bomb-in-backups\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/06\\\/outdated-software-a-ticking-bomb-in-backups\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Outdated Software &#8211; A Ticking Bomb in Backups\",\"datePublished\":\"2025-06-20T03:54:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/06\\\/outdated-software-a-ticking-bomb-in-backups\\\/\"},\"wordCount\":1080,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/outdated-software-a-ticking-bomb-in-backups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/storware.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/05_2025_Outdated-Software_1200x630_1.png\",\"keywords\":[\"2025\",\"Storware\"],\"articleSection\":[\"Storware\",\"2025\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/storware.eu\\\/blog\\\/outdated-software-a-ticking-bomb-in-backups\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/06\\\/outdated-software-a-ticking-bomb-in-backups\\\/\",\"url\":\"https:\\\/\\\/storware.eu\\\/blog\\\/outdated-software-a-ticking-bomb-in-backups\\\/\",\"name\":\"Outdated Software - A Ticking Bomb in Backups - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/outdated-software-a-ticking-bomb-in-backups\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/outdated-software-a-ticking-bomb-in-backups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/storware.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/05_2025_Outdated-Software_1200x630_1.png\",\"datePublished\":\"2025-06-20T03:54:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/outdated-software-a-ticking-bomb-in-backups\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/storware.eu\\\/blog\\\/outdated-software-a-ticking-bomb-in-backups\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/outdated-software-a-ticking-bomb-in-backups\\\/#primaryimage\",\"url\":\"https:\\\/\\\/storware.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/05_2025_Outdated-Software_1200x630_1.png\",\"contentUrl\":\"https:\\\/\\\/storware.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/05_2025_Outdated-Software_1200x630_1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/outdated-software-a-ticking-bomb-in-backups\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Outdated Software &#8211; A Ticking Bomb in Backups\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Outdated Software - A Ticking Bomb in Backups - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/","og_locale":"zh_HK","og_type":"article","og_title":"Outdated Software - A Ticking Bomb in Backups - Version 2","og_description":"Updating software is one of the simplest and most effec [&hellip;]","og_url":"https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/","og_site_name":"Version 2","article_published_time":"2025-06-20T03:54:33+00:00","og_image":[{"url":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"6 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/06\/outdated-software-a-ticking-bomb-in-backups\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Outdated Software &#8211; A Ticking Bomb in Backups","datePublished":"2025-06-20T03:54:33+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/06\/outdated-software-a-ticking-bomb-in-backups\/"},"wordCount":1080,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/#primaryimage"},"thumbnailUrl":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1.png","keywords":["2025","Storware"],"articleSection":["Storware","2025","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/06\/outdated-software-a-ticking-bomb-in-backups\/","url":"https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/","name":"Outdated Software - A Ticking Bomb in Backups - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/#primaryimage"},"image":{"@id":"https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/#primaryimage"},"thumbnailUrl":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1.png","datePublished":"2025-06-20T03:54:33+00:00","breadcrumb":{"@id":"https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/#primaryimage","url":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1.png","contentUrl":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/05\/05_2025_Outdated-Software_1200x630_1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/storware.eu\/blog\/outdated-software-a-ticking-bomb-in-backups\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Outdated Software &#8211; A Ticking Bomb in Backups"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-tdy","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/112316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=112316"}],"version-history":[{"count":5,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/112316\/revisions"}],"predecessor-version":[{"id":112550,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/112316\/revisions\/112550"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=112316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=112316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=112316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}