{"id":42181,"date":"2021-08-06T11:44:00","date_gmt":"2021-08-06T11:44:00","guid":{"rendered":"http:\/\/4fc59ce6-1288-4349-8e49-fe796929bef1"},"modified":"2021-08-06T11:44:00","modified_gmt":"2021-08-06T11:44:00","slug":"legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/","title":{"rendered":"Legacy IT: Saving money by holding onto old tech is costing us all billions"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/08\/06\/5f6b53b8-ebdb-4026-8112-aae10a5420b5\/thumbnail\/770x578\/987f125701179f7a2077791f572052f2\/shutterstock-1896451018.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Nearly half the money the UK is spending on IT goes on supporting legacy IT systems \u2013 to the tune of \u00a32.3bn a year.<\/p>\n<p>That sum amounts to about half of the \u00a34.7bn the central government spent on on tech in 2019, according to a <a href=\"https:\/\/www.gov.uk\/government\/publications\/organising-for-digital-delivery\/organising-for-digital-delivery\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">new report from the Cabinet Office<\/a> that highlights the cost of maintaining legacy systems or &#8216;keeping the lights on&#8217;.<\/p>\n<p>&#8220;A recent analysis by government security indicates that almost 50% of current government IT spend (\u00a32.3b out of a total central Government spend of \u00a34.7bn in 2019) is dedicated to &#8220;keeping the lights on&#8221; activity on outdated legacy systems, with an estimated \u00a313-22bn risk over the coming five years,&#8221; <a href=\"https:\/\/www.gov.uk\/government\/publications\/organising-for-digital-delivery\/organising-for-digital-delivery\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">the report notes<\/a>.&nbsp;<\/p>\n<p><strong>SEE: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/microsoft-heres-how-to-shield-your-windows-servers-against-this-credential-stealing-attack\/\"><strong>Microsoft: Here&#8217;s how to shield your Windows servers against this credential stealing attack<\/strong><\/a><\/p>\n<p>As the report highlights, the technical debt that tax payers are lumbered with includes important operational services that are provided by out-of-date legacy systems often built on obsolete technical platforms or using programming languages that are no longer widely supported.<\/p>\n<p>Beyond costs, the report acknowledges increased cybersecurity risks and being unable to introduce new government services because &#8220;worthy but dull&#8221; is more attractive than risking spend on new IT systems.&nbsp;<\/p>\n<p>&#8220;Some departmental services fail to meet even the minimum cybersecurity standards, and the inability to extract usable data from these legacy systems,&#8221; the study notes.&nbsp;<\/p>\n<section class=\"sharethrough-top placeholder\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>It also singles out the Home Office, which has the biggest tech budget, noting has &#8220;not been able to retire any of their twelve large operational legacy systems.&#8221;<\/p>\n<p>The report comes as the National Cyber Security Centre (NCSC) \u2013 a part of spy agency GCHQ \u2013 has <a href=\"https:\/\/www.zdnet.com\/article\/boardrooms-still-arent-taking-cybersecurity-seriously-and-thats-putting-everyone-at-risk-from-attacks-warns-new-ncsc-boss\/\">raised alarm bells over ransomware and data breaches<\/a>. Recently appointed NCSC CEO <a href=\"https:\/\/www.zdnet.com\/article\/the-uks-cybersecurity-agency-is-getting-a-new-boss\/\">Lindy Cameron<\/a> in May called on boards to promote CISOs to the same level of top legal counsel and finance officers following recent software supply chain attacks.&nbsp;<\/p>\n<p>The UK is also taking a stab at boosting government online services through <a href=\"https:\/\/www.zdnet.com\/article\/the-government-wants-to-have-another-go-at-digital-identity-can-it-get-it-right-this-time\/\">the new Government Digital Service (GDS) department<\/a>, which is looking to improve online tax return services.&nbsp;<\/p>\n<p>The UK <a href=\"https:\/\/www.zdnet.com\/article\/proving-who-you-are-online-is-still-a-mess-and-its-not-getting-better\/\">still hasn&#8217;t figured out<\/a> how to implement something like <a href=\"https:\/\/www.bankid.com\/en\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Sweden&#8217;s BankID system<\/a>, which provides an effective nationwide web- and smartphone-based identity scheme through the nation&#8217;s banks that&#8217;s used to sign payments for and sign-in to websites of telcos, all government agencies, and even small businesses.&nbsp;<\/p>\n<p><strong>SEE: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/attacks-on-critical-infrastructure-are-dangerous-soon-they-could-turn-deadly-warns-analyst\/\"><strong>Attacks on critical infrastructure are dangerous. Soon they could turn deadly, warn analysts<\/strong><\/a><\/p>\n<p>The report calls out agencies for not having a systematic way of reviewing operational metrics, such as uptime, the number of attempted cyberattacks, and system efficiency.&nbsp;<\/p>\n<p>Surveys with agency digital chiefs also turned up procurement problems and &#8220;frustration around the level of duplication&#8221; and a lack of information-sharing between departments.&nbsp;<\/p>\n<p>And the government&#8217;s efforts towards gathering data for better decision-making is basically being wasted.&nbsp;<\/p>\n<p>&#8220;Our investigations suggest that many government departments are investing significant sums in collecting and storing often very large datasets but making little use of this data to influence action of decision making,&#8221; it notes.&nbsp;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Report demands that the government cleans up its act with technology or risk huge IT bills and damaging cyberattacks.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42182,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-42181","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Legacy IT: Saving money by holding onto old tech is costing us all billions 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Legacy IT: Saving money by holding onto old tech is costing us all billions 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-06T11:44:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Legacy IT: Saving money by holding onto old tech is costing us all billions\",\"datePublished\":\"2021-08-06T11:44:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\\\/\"},\"wordCount\":527,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\\\/\",\"name\":\"Legacy IT: Saving money by holding onto old tech is costing us all billions 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions.jpg\",\"datePublished\":\"2021-08-06T11:44:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Legacy IT: Saving money by holding onto old tech is costing us all billions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Legacy IT: Saving money by holding onto old tech is costing us all billions 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/","og_locale":"en_US","og_type":"article","og_title":"Legacy IT: Saving money by holding onto old tech is costing us all billions 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-06T11:44:00+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Legacy IT: Saving money by holding onto old tech is costing us all billions","datePublished":"2021-08-06T11:44:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/"},"wordCount":527,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/","url":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/","name":"Legacy IT: Saving money by holding onto old tech is costing us all billions 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions.jpg","datePublished":"2021-08-06T11:44:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/legacy-it-saving-money-by-holding-onto-old-tech-is-costing-us-all-billions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Legacy IT: Saving money by holding onto old tech is costing us all billions"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42181"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42181\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42182"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}