Content written for

Small & medium business
Large organisations & infrastructure
Government

Legacy technology poses a significant and enduring risk to any organisation’s cyber security. 

Legacy technology is defined as any technology that is no longer supported by the manufacturer, developer or vendor. This means that these technologies do not receive important security updates and patches and are more vulnerable to cyber attacks. 

Malicious actors can also use legacy technology vulnerabilities to gain access to other more modern systems that your organisation relies on. 

Managing legacy technology is a priority in maintaining the overall cyber security of your organisation. Take action on your legacy technology by replacing it with technology that is still receiving support and updates from the manufacturer, developer or vendor.

Where this is not feasible, or replacing legacy technology will take some time, temporary measures should be adopted to mitigate some of the risk. 

These measures include implementing or increasing: 

  1. Best practice event logging
  2. Appropriate network segmentation and/or segregation
  3. Common hardening techniques
  4. Multi-factor authentication (MFA) and account hygiene
  5. Application surface reduction
  6. Scheduling system availability and access.

Discover more resources below to help you manage your legacy technology including guidance for executives and practitioners.

Was this helpful?
Yes this was helpful
No this was not helpful

Thanks for your feedback!

We welcome additional feedback below.

Was this information easy to understand?
Will you take action after reading this?
Did you find the information you were looking for?
Did the design and layout of this page meet your expectations?