John Defterios: Even small businesses today have numerous vulnerable computing devices and software packages. Most have no means of tracking either the hardware or software, or assessing the related risks. Most organizations have no way to even quantify their number of unsupported systems, he says. The hacking world seems to have no problem zeroing in on these systems as part of an attack, he writes. The problem is not a new issue, but it’s a bigger issue with software with known vulnerabilities, he adds. Equipment life cycle is not something that should suddenly turn into a crisis.”]