{"id":2044,"date":"2004-07-12T00:00:00","date_gmt":"2004-07-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/07\/12\/ies-market-share-drops-security-gaffes-to-blame\/"},"modified":"2021-12-30T11:40:32","modified_gmt":"2021-12-30T11:40:32","slug":"ies-market-share-drops-security-gaffes-to-blame","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/07\/12\/ies-market-share-drops-security-gaffes-to-blame\/","title":{"rendered":"IE&#8217;s Market Share Drops, Security Gaffes To Blame"},"content":{"rendered":"<p>The recent wave of security holes in Internet Explorer &#8212; and calls by experts and analysts to switch to another browser &#8212; are having an effect on Microsoft&#8217;s market share, WebSideStory, a San Diego Web measurement supplier said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to data compiled by WebSideStory, Internet Explorer&#8217;s market share has dropped 1.32 percentage points since June 4, the first marked decay in IE&#8217;s leadership since 1998.<\/p>\n<p>&#8220;Sometimes these are just spikes,&#8221; said Geoff Johnston, an analyst with WebSideStory, &#8220;but this has become a very predictable trend.&#8221;<\/p>\n<p>Internet Explorer has had more than 95 percent of the browser share for the past two years, and until early June of 2004, had owned about 95.7 percent of the market.  Within the last month, however IE&#8217;s share of the U.S. browser business fell from 95.48 on June 4 to 94.16 on July 9.  Netscape and Mozilla, meanwhile, saw their share climb from 3.54 percent to 4.59.<\/p>\n<p>&#8220;The past couple of years, IE&#8217;s share has been pretty steady.  But this is the first time we&#8217;re seeing an actual trend,&#8221; said Johnston.<\/p>\n<p>A one-and-a-third point loss may not set alarm bells ringing at Microsoft, but when one considers how many people use the Internet, the number of users switching are significant.<\/p>\n<p>Some analysts estimate the U.S. Internet population at around 200 million.  A 1.32 percent change in browsers, then, translates into 2.6 million dropping IE.  The slip by IE is also important, said Johnston, simply because it&#8217;s so difficult to get people to change browsers.  &#8220;There&#8217;s this huge inertia,&#8221; he said, &#8220;that keeps them using the same browser.&#8221;<\/p>\n<p>Behind the downturn in IE&#8217;s share, said Johnston, is the combination of its recent slew of security problems and the appearance of alternatives that are as good, or in some cases better, than Microsoft&#8217;s browser.  The security problems [of IE] mixed with the launch of excellent alternatives, like Firefox, are what&#8217;s finally getting people to switch.  They&#8217;re thinking, &#8216;I&#8217;m not the only one.&#8217;  <\/p>\n<p>Like they say, nothing attracts a crowd like a crowd.&#8221;<\/p>\n<p>http:\/\/www.techweb.com\/wire\/story\/TWB20040712S0003<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2044","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2044"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2044\/revisions"}],"predecessor-version":[{"id":4531,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2044\/revisions\/4531"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}