SIS Blog

Outdated Technology Is Hurting Your Security

by | Sep 18, 2020

microchip

Are you using legacy security software or hardware in your organization? Does your team continue to support increasingly out-of-date technology? If so, you may be heading for a serious security crisis. Although using outdated technology is a common practice at many public and private organizations, it is a dangerous situation.

This issue applies to both run-of-the-mill technologies such as the operating system on workstations and security tools such as alarm monitoring setups. If you need to break out the calendar to figure out when your last technology audit and update was (or worse, if you’ve never had one), you should start planning a review as soon as possible. It could save your organization from a security nightmare.

Reasons Organizations Frequently Use Outdated Technology

It takes time to update many separate instances of physical security systems. Similarly, if numerous systems are reliant on a server, network node, or similar equipment, upgrading it requires either downtime or a temporary switch to a backup system. These types of changes can require a lot of time and money to get right.

Additionally, there is always the risk that upgrading will cause problems that are unforeseen causing additional downtime or costs. Plus, operations may be interrupted if not all instances of outdates systems and platforms are updated at the same time.

Therefore, many executives are more than happy to put off upgrading. They view it as a simple way to cut costs in the short term. Unfortunately, the end result is that many organizations are several versions behind the most recent release of the tools they use.

While it may seem prudent to avoid the costs and risks of upgrading, the drawbacks of not doing so are much higher. In short, it is a good idea to schedule a review of your technology with the intent of upgrading.

Risks Associated With Outdated Technology

Unnecessary Vulnerabilities

Risking these weaknesses is completely unnecessary. Implementing a robust and consistent update/upgrade process eliminates this threat. Don’t leave unpatched vulnerabilities in your system simply because you don’t want to take the effort to bring outdated technology up to date.

As any security expert can tell you, a system is only as strong as its weakest link. Old technology tends to be the weak link in the chain. It doesn’t matter how robust your other tools are if you have vulnerable entry points that can be exploited with well-known and documented techniques.

System Failure

Conversely, older systems may be prone to failure if they are put under ever-increasing loads. Similarly, your security cameras and alarms may have previously worked without centralized alarm monitoring. However, that may not be the case anymore. They may be bottlenecks or failure points.

Lower Productivity

Better tools typically make it easier for teams to monitor and control the various assets they need to protect. By leveraging a system integrator, it can help to connect your legacy systems with your new systems to drive efficiency of monitoring multiple alarms from one central location. Trying to save money in the short term by avoiding upgrades often leads to costly productivity losses.

You Need To Update/Upgrade

Steps You Can Take To Resolve the Situation

  1. Start with an audit of your current systems. Identify everything that is older than two years old and that could be updated or upgraded.
  2. Evaluate those systems for their security and productivity implications. Prioritize the list based on the benefits of updating and how out of date a system is.
  3. Consider what will be necessary to upgrade each system. While you should never let your technology go without an update because the change is hard, it may make sense to upgrade low-urgency systems quickly just because they are easy.
  4. Determine whether a direct update or changing to a superior alternative would make the most sense.
  5. Plan and implement the specific upgrades of each system.
  6. Repeat this process periodically to eliminate all outdated technology.

Enhance Your Alarm Monitoring Capabilities With Alarm Center

View More Posts

a view of pillars outside a government building

Breathing New Life into Legacy Systems: Solutions for Extended Longevity

When you’re working within the limits of a government budget, you know you have to be resourceful, smart, and creative to get things done.   So when you look at your legacy systems–from your decades-old fire alarms to those access control systems from the 1990s–you know you have to get the
an image of a computer closing

Protecting Critical Infrastructure in Today’s Rapidly-Evolving Threat Landscape

Protecting our nation’s critical infrastructure is one of the toughest jobs that you, as a security professional, may ever face. Whether your mission is to protect government facilities, energy infrastructure, nuclear reactors, transportation systems, information technology, or any of the United States’ 16 critical infrastructure sectors, you know that the
in house monitoring

Strategic Action Planning: Enhancing Operator Guidance in Public Security Operations

When a threat is detected, a perimeter is breached, or lives are in danger, the first to dispatch help are the operators: they are responsible for swiftly analyzing the situation, assessing a multitude of risks, coordinating stakeholders, and allocating resources to mitigate potential security risks.   This is why it’s so