• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Government • Healthcare • Network Security • UTM  /  Legacy Systems longing for enterprise attention?
Why should businesses boost the immunity of Legacy Systems?
06 August 2020

Legacy Systems longing for enterprise attention?

Written by Seqrite
Seqrite
Government, Healthcare, Network Security, UTM
Estimated reading time: 3 minutes

Legacy systems such as mainframes may be considered outdated by today’s standards but they continue to play major roles in many sectors, primarily finance, government, retail, healthcare and insurance. In these industries, they are crucial parts of day-to-day operations, because of their large-scale batch and transaction processing capabilities.

Don’t ignore Legacy Systems!

Legacy systems may seem like an anachronism in 2020 when the world is talking about modern workplaces, digital transformation and the Internet of Things (IoT). Yet, like it or not, even the most future-ready organization must understand that the mainframe is an important part of its infrastructure and hence requires a similar level of cybersecurity planning. While endpoint security and laptops are also important, it is foolish to believe that legacy mainframe systems are not at risk even if conventional wisdom suggests that they were built during an era when cybercrime was not as prolific as it is now.

The crux of the matter is cybercriminals remain very aware and seek to take advantage of vulnerabilities caused due to legacy systems. An example of this was found in 2014 when an unsecured Amazon S3 server was left online by FedEx. The server belonged to Bongo which had been acquired by FedEx. It was a legacy server that had gone unnoticed during FedEx’s acquisition of Bongo.

Part of the neglect towards legacy systems arises from a lack of understanding about what they constitute. In a note, the United States Computer Emergency Readiness Team answered this question by outlining a few types of legacy systems, some of which are mentioned below:

  1. Terminal Mainframe Systems

Terminal systems were the first type of computing devices which consisted of a large central processor mainframe, accessed by users through simple, directly attached terminals. It emerged in the 1960s and remained popular till the 1980s.

  1. Workstation (Client/Server) Systems

From the 1980s onwards, personal computers (PC) were being used with local area networks (LANs) connecting these PCs.

  1. Browser (Internet) Systems

The Internet heralded a new era of enterprise connectivity by allowing a universally available browser program running on a connected workstation for users to access and upload data.

With the emergence of modern-day Advanced Persistent Threats (APT) and emulation tactics, it has now become critical to concentrate on securing legacy systems as they may be susceptible to vulnerabilities. Enterprises can no longer ignore legacy systems but must start exploring ways to secure them.

What sort of Legacy Systems are there in the enterprise?

The first step is the most difficult but is the most necessary. Especially for enterprises which have had an IT system for decades, creating a list of legacy systems may seem like an impossible task but it is important to create one to understand how to secure them. Even creating a list like this will throw in information which was not available earlier – an enterprise may discover they use outdated legacy systems for essential tasks which may cause a security incident

Assess and take action

Once an enterprise knows the specifications of the legacy systems that exist within its perimeters, it can then move on to the next steps which include assessment and action. An assessment should include the risk potential of the systems. Depending on these assessments, enterprise systems can consider the actions they can take to mitigate these problems. These solutions could include up-gradation of the system or application of enhanced security solutions to mitigate the problem.

Seqrite’s range of enterprise security solutions could help you to secure legacy systems. Explore products such as Endpoint Security (EPS) and Unified Threat Management (UTM) to understand how we can meet your enterprise security needs.

 Previous PostMassLogger: An Emerging Spyware and Keylogger
Next Post  AV-Test certifies Seqrite EPS as the top product for Windows, yet...
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • etwork Security enters a new phase with SASE

    What is SASE and how does it reinforce network security?

    May 13, 2020
  • APTs Targeting Critical National Organizations

    Transparent Tribe Targeting Critical Indian Organizations

    May 12, 2020
  • Understanding-network-intrusion-vectors

    What are the different techniques of intruding networks?

    December 19, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form March 22, 2021
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • How to avoid dual attack and vulnerable files with double extension?

    How to avoid dual attack and vulnerable files with double extension?

    April 9, 2021
  • Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    April 4, 2021
  • Zloader: Entailing Different Office Files

    Zloader: Entailing Different Office Files

    March 23, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (10) Bitcoin (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (284) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (14) EPS (9) Exploit (12) firewall (11) GDPR (10) IoT (10) malware (59) malware attack (23) malware attacks (12) MDM (25) Network security (18) Patch Management (12) phishing (17) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite Workspace
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.