Emerging cyber security challenges with legacy systems

Over the course of the pandemic, organisations shifted to remote working which resulted in several cyber security challenges. One of the prevalent problems for most enterprises is managing cyber security for legacy systems.

A fundamental aspect of any good cyber security strategy is to plan as a matter of priority how legacy systems will remain secure amid remote access usage for most digital platforms.

Maintaining cyber security of legacy systems in circumstances where cyber threats are exponentially growing is a matter of concern for many security analysts. A core problem surrounding legacy systems is keeping them up to date while cyber threats are more prevalent.

Legacy systems often have software or hardware that is outdated. Updating the software/hardware is challenging especially with products that are no longer supported by manufacturers. Consequently, the systems are unable to the implement strong cyber security measures.

Legacy systems are prone to inherent system weaknesses including vulnerabilities and usually do not support multi-factor authentication. Another cyber security pitfall is the lack of satisfactory encryption protocols available with legacy systems.

Despite the emerging cyber security challenges, organisations continue to rely on legacy systems. There is no straightforward solution for fixing the cyber security challenges, but an important step is ensuring all system patches and software is updated.

Other tips from TechDecoded on the issue of ensuring cyber security with legacy systems are:

  • Establish stringent policies and rules for the governance and management of legacy systems.
  • Delete any services or applications that are unused.
  • Identify measures to strengthen operating system security.
  • Reassess and evaluate user access for legacy systems. Limit access to mandatory use only.
  • Ensure regular and timely backups are taken for disaster recovery purposes.
  • Remove critical or sensitive data from legacy system servers.
  • Undertake regular vulnerability scans to limit gaps.
  • Separate network traffic flow from legacy systems and your main organisational network.
5