The recent widespread attacks of WannaCry and NotPetya both used known vulnerabilities of legacy operating systems, namely SMB v1 protocol. In general, known vulnerabilities are easy to mitigate as long as patches and updates are provided. But in these cases, many organizations seem to have ignored the advice to patch their systems — or maybe not.

There are two main reasons for this negligence: Either organizations are not aware of the presence of legacy systems, or updating these systems isn’t as easy as it sounds.

In some environments, those legacy systems host applications that control vital business processes. Replacing or updating proprietary software is costly and sometimes virtually impossible, but that doesn’t mean you have to accept the risk of using legacy systems. The following security principles can help to minimize this risk at reasonable costs.

Identify Legacy Systems

Visibility and knowledge about the organization’s environment are crucial to an effective cyberdefense strategy. A discovery scan is a very efficient method to identify legacy systems. It also provides information about the network architecture and vulnerabilities on any system. Vulnerability scans should be done regularly from inside and outside the network.

Isolation and Strict Access Control

Systems that are no longer supported with patches should be quarantined from any other system environment, especially endpoint networks. A single legacy system can be the gateway for malware to spread throughout a network.

You must also ensure that those systems are not directly accessible from the internet, and guarantee that any communication with them is restricted to minimal need. This can be achieved by placing these systems in their own network segment behind a router or firewall.


Every system should be hardened according to its purpose. This is especially important for legacy systems. Hardening means to disable any unnecessary service and implement least privilege concepts to reduce the general exposure. Even legacy operating systems such as the outdated Windows versions 2000–2003 can be hardened through measures such as disabling the SMB protocol.


The purpose of security monitoring is to ensure that the system fulfills the defined security baseline and detects suspicious activities as early as possible. Since many attacks go hand in hand with starting or stopping processes or altering permissions, monitoring should include security configuration and authentication events. Security monitoring is especially vital for legacy systems.

These measures can help you reduce the risks that arise when updating a system is simply not an option. However, in most cases, vigilant updating and patch management are the keys to protecting your network from undead threats lurking within your legacy systems.

Read the White Paper: Transforming Endpoint Security by going beyond attack detection

More from Network

X-Force Identifies Vulnerability in IoT Platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

4 min read

Cybersecurity in the Next-Generation Space Age, Pt. 4: New Space Future Development and Challenges

4 min read - View Part 1, Introduction to New Space, Part 2, Cybersecurity Threats in New Space, and Part 3, Securing the New Space, in this series. After the previous three parts of this series, we ascertain that the technological evolution of New Space ventures expanded the threats that targeted the space system components. These threats could be countered by various cybersecurity measures. However, the New Space has brought about a significant shift in the industry. This wave of innovation is reshaping the future…

4 min read

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

4 min read - Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

4 min read

Cybersecurity in the Next-Generation Space Age, Pt. 2: Cybersecurity Threats in New Space

7 min read - View Part 1 in this series, Introduction to New Space. The growth of the New Space economy, the innovation in technologies and the emergence of various private firms have contributed to the development of the space industry. Despite this growth, there has also been an expansion of the cyberattack surface of space systems. Attacks are becoming more and more sophisticated and affecting several components of the space system’s architecture. Threat Actors' Methodology Every space system architecture is composed of three…

7 min read