How to Keep Using Windows 10 Safely after Support Ends

Yes, it can be done.

Worried about Windows 10 after support ends? Don’t be. I'll show you the simple steps -- good habits and reliable security software -- that will allow you keep using your Windows 10 computer safely.
A desktop computer with a Windows 10 screen bathed in bright morning sunlight.
(Image: ChatGPT)
Question: You keep saying we can keep using Windows 10 safely after support ends. How is that even possible?

I know it’s a controversial position that not everyone agrees with, but I believe it’s quite possible to keep using Windows 10 safely after Microsoft ends its official support of the operating system.

There are two things you need to do. Both are things you should be doing already.

TL;DR:

Using Windows 10 safely

You can still use Windows 10 safely after support ends by doing two things: practice safe computing and use good security software. Even without new updates from Microsoft, with smart habits and good tools, your PC won’t suddenly become unsafe.

First, practice safe computing

This is the single most important thing you need to do to keep using Windows 10 safely.

In fact, it’s something you should already be doing and should represent no additional work on your part. Windows 10 end of support is simply a reminder not to drop your guard.

What does that mean? From my most important article:

  • Use good security software. (More on this below.)
  • Keep your other software up-to-date.
  • Secure your online accounts.
  • Educate yourself.
  • Secure your home and mobile connections.
  • Remember physical security.
  • Back up.

I’ll go one step further and say that your actions are much more important than anything Microsoft might fix in the operating system, regardless of the version of Windows. Why? More people are compromised by skimping on those things than they are by some random unpatched vulnerabilities.

In fact, most unpatched vulnerabilities require that malware make it past you to be exploited. In other words, if there is something that Microsoft doesn’t patch, your good habits are what protect you.

Second, use good security software

I continue to recommend Windows Security (aka Windows Defender) as a solid security solution built right into Windows. It’s already there, and you may already be using it.

Microsoft has stated that they will continue to provide security definition updates for Windows Security until at least 2028. Thus, even on Windows 10, where Windows itself will not be updated after the end-of-support date, the security software will remain current.

There are also several other good security suites that you can switch to (Windows Security will step out of the way when you install them) that will continue to provide protection long after Windows 10’s end of support.

Two-step protection

The result is what I’ll refer to as two-step protection:

  1. Your good habits will prevent malware from reaching your machine.
  2. Up-to-date security software will detect and thwart most everything else that might make it through.

Extended Security Updates (ESU)

If you intend to continue to use Windows 10 past its end-of-support date, consider signing up for Extended Security Updates.

The ESU program is nothing more than an extension of the end-of-support deadline for one year. After that year is up, you’ll simply continue as above, relying on yourself and your security software once again.

But aren’t operating system updates critical?

Keeping all your software as up to date as possible has always been important, and that hasn’t changed. However, “important” doesn’t mean “can’t live without”.

Security — all security — is about playing the odds and stacking the deck in your favor. There’s no such thing as perfection, even with Windows security updates.

Looking at it a different way, all these things have to be true for something bad to happen to your computer1:

  1. There must be a bug in Windows.
  2. That bug must represent a security vulnerability of some sort.
  3. Hackers need to know about the bug.
  4. Hackers need to devise a way to exploit the bug for malicious purposes.
  5. There must be a way for hackers to get that exploit to you — typically as malware.
  6. You have to “allow” the malware onto your machine, usually through a download of some sort, including attachments.
  7. Your security software must miss the fact that malware has been downloaded to your machine.
  8. You have to “run” the malware, meaning you run a download or open an attachment.
  9. Your security software must miss the fact that malware is running on your machine.

Thwarting any of those items means that the malicious vulnerability will not affect you. Ongoing security updates deal only with #1, and even then, only if #2 is deemed “important enough”.

Malware still has many hoops to jump through before it impacts you.

Your job: keep your guard up for the steps you control. That means not allowing malware onto your machine to begin with and using good security software.

The objection

There are two primary objections to what I suggest.

  • There is a theory that hackers have already discovered one or more vulnerabilities but are holding on to that knowledge until after the end-of-support date. After that date, they’ll release malware exploiting the vulnerabilities and wreak havoc.
  • Some people think that Windows vulnerabilities are found so frequently that it’s inevitable that something will be discovered after the end-of-support date, and hackers will exploit the vulnerability and wreak havoc.

I don’t think hackers are disciplined2 enough for the first to have any merit. Windows 7’s end of support faced the same fear, and nothing came of it. In a way, it’s merely a subset of the second point.

As for the second, I don’t buy it. Sure, there’s a constant stream of bug fixes to Windows — we see it every “patch Tuesday” — but by and large, those a) aren’t security issues, and b) those that are rarely affect broad swaths of Windows users.

On top of that, most bugs are introduced as software is changed. Windows 10 isn’t changing anymore. The rate at which Windows 10 vulnerabilities are being introduced should be at a near standstill. The only potential concern would be vulnerabilities that have gone undetected for a long time, which by definition should be nearly none.

We have experience

As I’ve said in a few places, we’ve been here before. We have experience with exactly this scenario in two interesting and different ways.

First, when Windows 7’s support ended, there were dire predictions of both of the objections above: a previously known vulnerability to be unleashed after the end of support, and dire consequences to follow. Neither materialized.

Just as there are people who want to stick with Windows 10 today, some folks kept on using Windows 7 safely after its end of support. How? By following the two-step protection I outlined above. Some are still using Windows 7 today!

Second, some people have been running Windows 10 without updates for some time already. For various reasons — often the perception that Windows Updates are more disruptive than they’re worth — individuals disable updates. That means no updates at all, security or otherwise. They’re apparently happy with their result.

I also hear from others looking forward to the cessation of Windows 10 updates for that very reason.

Microsoft only benefits from your fear

I’m not one to jump onto conspiracy theories, and while I don’t think this is intentional, it’s worth pointing out.

It’s in Microsoft’s best interest to let all the FUD (fear, uncertainty, and doubt) about Windows 10’s end of support go unchallenged. The more people feel they must update to Windows 11, even if that means getting a new machine, the better Microsoft (and PC manufacturers) make out.

That you can keep using Windows 10 safely isn’t a message you’re going to hear from Microsoft.

The wildcard: third-party software

One fly in the Windows 10 ointment might not be Microsoft at all. At some point, the software you use from other sources may stop supporting Windows 10.

This is another path we’ve been down previously. After Windows 7 support ended, most software from other sources kept right on working. In fact, many continue to work and be updated on Windows 7 to this day.

But not all. At various points in the years since, some software vendors have decided to stop supporting Windows 7. In most cases, though, it was several years after Microsoft’s Windows 7 support ended.

There’s every reason that the same will happen to Windows 10. In fact, I’ve heard reports of at least one software package already requiring Windows 11 for future versions.

There’s little you can do about that other than move to Windows 11, find an alternative that still supports Windows 10, or keep using the last version that still supports it.

Do this

Upgrade to Windows 11 if it makes sense for you. That means both you and your hardware are compatible with Windows 11.

If that’s not you, however, you can keep using Windows 10 safely by following the two-step process I outlined above. Those two steps should already be what you’re doing, anyway.

Subscribe to Confident Computing! Less frustration and more confidence, solutions, answers, and tips in your inbox every week.

Podcast audio

Footnotes & References

1: Not including non-operating-system-related stuff. For example, “something bad” could still involve phishing, which has nothing to do with Windows or Windows Security Updates.

2: Some, maybe, but relying on so many to keep a secret for that long, particularly when exploiting such a vulnerability could lead to some short-term gain, just doesn’t seem reasonable.

5 comments on “How to Keep Using Windows 10 Safely after Support Ends”

  1. We have several PCs in our household that all officially do not support Windows 11. But with a modified Windows Install USB stick made with Rufus all of them now run Windows 11 without any problems so far. This seems to be safer for me than to stick to Windows 10.

    Reply
  2. My daughter tells me that she was notified by the huge and well known (US) Tax Prep company she uses will not be allowing their product to be purchased and downloaded to a Windows 10 computer starting this coming tax season.

    They will only allow tax returns to be completed while online at their website. This is something that would concern her. She feels safer preparing the return while offline, then only when it is complete does she go online to send it.

    I suspect other companies may do similar things and we may be “forced” to upgrade if we want to continue using all the products we are used to and like.

    Reply
  3. 25/09/25
    Hi Leo, I agree that simple rules concerning daily activity on the PC would keep one’s PC secure.  However, in my case I have purchased a new Windows 11 computer and use it as my main PC.  Whilst my Windows 10 PC has been completely re-set to factory settings without any files being saved.  I use this PC in my bedroom as a TV set watching You Tube videos only.  I have downloaded the Chrome browser (not linked) and through that am using a couple of my E-mail clients which are linked of course to my iPad and main PC.  I don’t intend to do many searches on the old PC, but may do some now and then whilst I am looking for videos to watch.  I generally save the links to videos to watch on one of my E-mail clients and thus all I have normally to do is to click on those links through my linked E-mail client.  Now my query is that if my old PC is infected somehow, would that spread to my other devices through my E-mail clients which are linked?  Secondly, is there any other way that this arrangement would be a danger through the Internet and affect any of my other equipment?
    I would appreciate your kind advice, and thank you for your attention.
    Carl Vaz. 

    Reply
    • The majority of the risk is still covered by my recommendations in the article: practice good security. The risk, for example, is that you download a malicious attachment and run it. That’s a risk on either 10 or 11. Once malware is on either machine, there are forms of malware — fortunately now very rare — that might travel from machine to machine across your local network. Again, very rare these days. I don’t see anything particularly concerning about emailing a youtube link to yourself, though.

      Reply
  4. Hello Leo,

    thank you for this article, it’s very helpful. I am not one to rush in and get the latest upgrade or the latest OS, I prefer to wait for a while until the dust settles (and the bugs are found).

    You mentioned “Good Habits” in the article, but you didn’t tell us about these good habits, perhaps some folk need reminding? i.e., don’t open unknown emails, don’t click on links in strange emails, don’t download drivers from unknown sites, etc, etc.

    Cheers from Australia
    Dianna

    Reply

Leave a reply:

Before commenting please:

  • Read the article.
  • Comment on the article.
  • No personal information.
  • No spam.

Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam. All comments containing links and certain keywords will be moderated before publication.

I want comments to be valuable for everyone, including those who come later and take the time to read.