Patching Microsoft vulnerabilities cost the U.S. Government as much as $50 million a year, which is the equivalent of:

  • VA benefits for 23,745 veterans for a year
  • Enhanced FBI background checks for a year
  • Salaries for 756 Border Patrol agents for a year
  • Salaries for 346 air traffic controllers for a year
  • SNAP benefits for 22,257 people for a year
  • WIC program benefits for 68,306 people for a year
  • Head Start participation for 4,815 children for a year
  • Disaster relief for 14,509 households
  • The Childhood Cancer Data Initiative for a year
  • Farm subsidies for 1,786 farms for a year

Home

Microsoft software is the most commonly used by the U.S. government. At the same time, it is the most insecure by far—accounting for 25% of the Cybersecurity and Infrastructure Security Agency’s (CISA’s) list of known exploited vulnerabilities (304% more than the next closest vendor). Don’t take our word for it—just look at the track record.

In the last few years, the U.S. government has been hacked by North Korea, Russia, and China (and China, China and China) via vulnerabilities in Microsoft software. This has inflicted a massive cost to our national security and to taxpayers, and damage to America’s standing in the world.

This website is an effort supported by NetChoice and informed by numerous security experts and organizations to catalog Microsoft’s insecure technology and try to estimate the direct costs to taxpayers. We want to ensure policymakers, regulators, and media are aware that the status quo greatly harms government and taxpayers. Reform to U.S. government software acquisition is necessary.

Since January 1, 2024 there have been: