Layered security is a cybersecurity approach that implements multiple layers of security controls. If an attacker manages to get past one security control, they have one or more additional security measures to evade if they’re targeting a system with layered security. Think of the additional security layers as fail-safes or backup measures. Layered security is also known as defense in depth.
Over time, new technologies emerge that provide more advanced software and computing functionality, leading businesses to invest in upgrading their applications and systems. Legacy IT refers to an outdated operating system or software application that’s still being used by an organization because it supports a critical business function. It includes applications that developers no longer update, maintain, or support (which may contain vulnerabilities), systems or applications that are no longer sold or utilize obsolete technologies, and hardware that can no longer support a company’s software systems. These factors can make legacy IT difficult and costly to maintain.