Interconnected devices and the true ?internet? cause security challenges to organisations with critical legacy systems. This article discusses a number of legacy issues around Industrial Control Systems and ?untouchable? legacy devices and proposes a number of easy and effective mitigations to the practices that expose them to the world.
Computer systems, technologies and applications that do not meet current standards, known as legacy systems, are increasingly connected to the Internet for various reasons. Connecting them to an environment that they were never intended for can potentially have serious operational security risk implications. This article discusses some of the reasons.
Select the newsletters to which you want to subscribe