Hacker attack computer hardware microchip while process data through internet network, 3d rendering insecure Cyber Security exploit database breach concept, virus malware unlock warning screen

Legacy tech thwarting efforts to combat ransomware

A reliance on legacy technology is stifling the efforts of organisations to protect themselves against threats such as ransomware, according to new findings.


Global research commissioned by data management specialist Cohesity has shown that half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage and protect their data. In some cases, this technology is more than 20 years old and was designed long before today’s multi-cloud era and the kind of sophisticated cyberattacks that are plaguing enterprises around the world.


Challenges to outdated infrastructure are being compounded by the fact that many IT and security teams don’t have a coherent plan in place for when a cyberattack occurs. More than 60% of respondents in the UK expressed some level of concern about whether their IT and security teams would be able to mobilise efficiently to respond to an attack.


“IT and security teams should raise the alarm bell if their organisation continues to use antiquated technology to manage and secure their most critical digital asset – their data,” said Brian Spanswick, chief information security officer, Cohesity. “Cyber criminals are actively preying on this outdated infrastructure as they know it was not built for today’s dispersed, multi-cloud environments, nor was it built to help companies protect and rapidly recover from sophisticated cyberattacks.”


Fifty percent (49.4%) of respondents said that their organisation relies on primary backup and recovery infrastructure that was designed in, or before, 2010. Among that group, 27% claim to utilise technology that was either designed between 2000 and 2005, or even before the new millennium.


Enterprises are utilising this legacy technology despite the fact that managing and securing data environments has become much more complex, not just because of the exponential growth in structured and unstructured data, but because of the vast array of locations where that data is stored. In the UK, 38% percent of respondents stated that they store data on-premises, 39% rely on public cloud storage, 50% utilise a private cloud, and 41% have adopted a hybrid model.


“In 2022, the fact that any organisation is using technology to manage their data that was designed in the 1990s is frightening given that data can be compromised, exfiltrated, held hostage, and it can create massive compliance issues for organisations,” added Spanswick. “In this survey, we easily found respondents who said their organisations are relying on very outdated data infrastructure, and this raises the question, how many other businesses are in the same situation around the world?”


If the negative impact of legacy technology is something that interests you, then you should make a date in your diary for the following virtual event:


Open Networks and the End of Legacy



Call for Papers

  • About You

  • About Your Paper Submission