Using legacy systems such as outdated software and hardware or using components that do not have security capabilities may expose the system and even the entire network to a security breach. We understand that sometimes legacy systems cannot be discarded due to technical and business limitations but it does not mean you have to accept the risks… The next slides will help you to secure legacy systems in user… stay safe!