News & Vacancies

Welcome to the Microtechs information portal. Here you can see the latest news and read through our current vacancies.

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Login
    Login Login form

“It’s The Legacy That Gets You”: What is the Threat Of Outdated Systems

Posted by on in Latest Microtechs news posts
  • Font size: Larger Smaller
  • Hits: 628
  • Subscribe to this entry
  • Print


During her keynote at this year’s Infosecurity Europe, Baroness Dido Harding - former chief exec of TalkTalk - warned other business leaders about the threat of legacy tech, and she was well placed to do so: TalkTalk customers had their details comprised in a large breach in 2015, resulting in huge damage to brand reputation for the company as well as a £400,000 fine from the ICO.

However, the threat of outdated systems is hardly a new one, and private businesses as well as public sector bodies are facing the same dilemma.

In brief, the shackles of legacy tech are inhibiting companies from fulfilling their digital transformation journeys and leave them exposed to new and emerging threats. So what are the barriers that are leaving organizations exposed?

Lack of awareness

Firstly, organizations can find themselves uninformed to the fact that they are running technology that is no longer supported by its creators and therefore poses a security risk. This can be the case for organizations that are rapidly progressing; part of this process might be making planned consolidations such as mergers and acquisitions, which in turn could mean inadvertently inheriting outdated technology.

This is essentially the situation that TalkTalk found itself in, as Harding explained: “We were a fast-growing company, acquiring others, and were hit by a simple SQL vulnerability in a legacy website that no one noticed.”

This mindfulness of legacy technology and infrastructure, particularly during times of amalgamation, is crucial; paramount to this is communication between IT teams and wider business leaders. Otherwise, organizations can find themselves out in the open to security risks – as Harding explained: "...there was the IT equivalent of an old shed in a field that was covered in brambles. All we saw were the brambles and not the open window."

Greater still, lack of awareness and understanding can also be found when it comes to vital software reaching its end of life. Many organizations still run legacy operating systems such as Windows XP which haven’t received security updates from the vendor in several years; an astonishing fact given the rate at which security threats are evolving and becoming more sophisticated.

It may be the case these organizations who still run legacy are simply naïve of the risks, but, often enough, the problem goes far deeper.

Time, cost and risk perception

Many organizations that run outdated software are not uneducated to the risks, but are still forced to host applications in an environment that has reached its end of life due to perceived limitations.

When it appears that their bespoke applications are incompatible when newer alternatives become available, organizations are seemingly left with the dilemma of either rewriting the applications or keeping them where they are.

The former scenario has the potential to present a huge time and budget expense that could extend into the millions for a large enterprise and, even more dire still, some organizations may not even possess the ability or talent in-house to undertake this process even if money and bandwidth permit.

Additionally, it is often the perceived notion of vendor lock-in that deters organizations from making the sensible and imperative decision to move away from legacy technology. Many organizations may feel that after sinking immeasurable amounts of time, effort and money into one particular vendor, it is difficult and painstaking to move to a more modern alternative.

The reality is far less bleak

It is important for organizations to understand that the barriers that seemingly hinder an organization’s journey away from legacy technology and towards a more modern future often do not exist.

Technology is available that provides portability for these applications; compatibility that does not discriminate against technology suppliers and can provide unification where it otherwise cannot be achieved.

The use of compatibility containers, for example, offers a ‘lift and shift’ option that does not require a single code change - saving time, money and resources in the process. With this in mind, the biggest obstacle to the modern threat of legacy technology is simply cognizance of the issue: a fact that, as more and more influential business leaders speak out about, will hopefully be diminished.

By Mat Clothier CEO, CTO and Founder at Cloudhouse

Image: Shutterstock

Microtechs 24/7 White Label support services

With Microtechs outsourced UK remote support services you can focus on managing relationships and delivering your core business. Manned 24/7 by fully trained technical staff in Surrey, your customers will receive a personal answer to any support issue raised, at any time of the day or night.

             Are you a IT / Telecoms / Software provider with an expanding customer base?

             Are you spending so much time on IT support that you struggle to develop new clients?

             Are you struggling to find and retain the right support team members?

             Need to cover extended hours easily?

             Had a poor experience outsourcing offshore?

             Looking to increase your customers up-time?

             Need to reduce your costs and lower overheads by as much as 40%?

Our client-specific 1st and 2nd line teams can monitor your servers and support queue (email, alert or phone) 24/7 or just as overflow. When a new incident comes in, we work to resolve the issue and respond to your customers through phone or your support system, thereby maintaining 100% transparent support. This includes 3rd party escalations and incident management.

As a white label managed service provider, we operate as an extension of you, so your customers will be thanking you for the expert service they receive, the peace of mind you bring and the additional value you have added to their business.

             Fully inclusive services with an average 80% resolution rate

             80% of telephone calls answered within 60 seconds

             Proactive NOC monitoring

             Completely white labelled to your brand / customers brands

             Desktop / Network / O365 / Mac / Telecoms / Bespoke software / Wi-Fi

             Pricing from £500 per month

If you need overflow during the day or a whole support desk from inception or just some monitoring services overnight, please drop me an email or give me a call.

Please contact us for further information on 01483 407417



  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Saturday, 25 May 2019


We help over 14,000 customers a month through our IT support centre in Guildford, Surrey

Microtechs monitor over 10,000 servers, access points and routers 24 hours a day, 7 days a week and answer well over 14,000 support calls a month.

Each and every client is just as important to us, whether you have 1 or 5000 computers or users. Our exceptional team provides the highest level of service to every single caller.



Our business truly is 24/7, We operate entirely out of this office using our own staff.

Microtechs Head Office

Microtechs Ltd
Sussex House
11 The Pines
Broad Street
GU3 3BH  

T: +44 (0) 1483 407400

Alternatively, please use our Contact Us Form




Our Commitment to you

We are family run with all of our business based within the UK. We will only ever use UK staff and offices to provide our products and services to you.

Microtechs provide a variety of outsourcing solutions for individuals and businesses, whether its for 24/7 Helpdesk Services, Nationwide Engineer Coverage or IT Support.