Legacy Systems: How Outdated Hardware and Software Threaten Corporate Security