This botched migration shows why you need to deal with legacy tech

While working on a piece about the talent crunch in cybersecurity, I was a tad surprised when legacy systems popped up as a common challenge that IT administrators struggle with today.
I expected organizations would have figured out by now that IT sprawl is costly and their adoption of new technology in search of operational efficiencies is unlikely to be fruitful if their migration plan does not include phasing out legacy systems.
With resources already scarce, clinging on to legacy infrastructure increases the workload for cybersecurity teams that have to safeguard newly acquired systems while still dealing with old tools that may no longer be supported by the manufacturer.
A recent botched transition to a new transport e-payment platform in Singapore might offer some answers.
On Jan. 9, the Land Transport Authority announced that two legacy stored value cards, EZ-Link and NETS FlashPay, would no longer be used to pay for public transport fares starting from June.
The move is part of the country's transition to the SimplyGo system that LTA said had commenced in 2019.
Apart from its use as payment for public bus and train fares, the contactless EZ-Link cards are also accepted as a payment option at various locations island-wide, including convenience stores, fast-food outlets, and taxis.
In its statement, LTA said most commuters would not be affected by the transition because they already are using SimplyGo EZ-Link or contactless bank cards.
The transport authority probably wasn't expecting the public outcry that swiftly followed.
In touting the benefits of SimplyGo, LTA said the platform's mobile app allows commuters to top up their cards anytime via credit or debit card and receive notification when the balance on their SimplyGo card is low.
They can also block further transactions if they lose their card.
Top on the list of grievances is the omission of one key feature that is available on the existing EZ-Link ecosystem: the ability to view fare deductions and card balances as commuters pass through train station gates and bus card readers.
This capability quickly emerged as a basic function that many had come to expect - and already had access to - on their public transport infrastructure, and were promptly appalled the feature would no longer be available on a supposedly newer and better system.
Chee said the existing infrastructure will remain in place until at least 2030 and SG$40 million will be set aside to purchase new hardware and maintain the existing system to allow commuters to continue using EZ-Link and NETS FlashPay cards.
Chee added that he had tasked LTA to assess ways to enhance the features and improve user experiences for account-based ticketing cards.
In particular, the priority will be finding ways for these cards to provide what commuters want - to view fare deductions and card balances as they enter and exit trains and buses.
To convince users to adopt new technology, you need to first give them a reason to do so.
Start by identifying how the new technology can benefit them and the organization.
Underestimating the importance of user buy-in will more likely lead to a resistance to change and is a key reason why businesses end up having to retain legacy systems.
As Singapore has seen, it only takes one underestimated user feature to halt an entire migration plan and add years to a system otherwise headed for sunset.


This Cyber News was published on www.zdnet.com. Publication date: Mon, 12 Feb 2024 10:13:03 +0000


Cyber News related to This botched migration shows why you need to deal with legacy tech

This botched migration shows why you need to deal with legacy tech - While working on a piece about the talent crunch in cybersecurity, I was a tad surprised when legacy systems popped up as a common challenge that IT administrators struggle with today. I expected organizations would have figured out by now that IT ...
4 months ago Zdnet.com
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
1 year ago Hackread.com
Cybersecurity teams need new skills even as they struggle to manage legacy systems - Already facing a dearth of talent, cybersecurity teams now need additional skillsets to deal with the growing adoption of generative artificial intelligence and machine learning. This is further complicated by a threat landscape that continues to ...
6 months ago Zdnet.com
Why you might not be done with your January Microsoft security patches - The January patching window for your firm has probably come and gone. Has it? While January included a huge release of patches, several releases in other months have provided more than one headache for the patch management community. These are the ...
1 year ago Csoonline.com
GCP to AWS migration: A Comprehensive Guide - Embarking on a GCP to AWS migration journey can be both exciting and challenging. Before we dive into the technical details, let's explore why businesses might consider migrating from GCP to AWS. While GCP offers a range of services, AWS boasts an ...
5 months ago Feeds.dzone.com
Cyber Security Managed Services 101 - Benefits of an MSP. Maximizing efficiency. Cyber threats and cyberattacks like ransomware targeting SMBs continue to increase in part because malicious actors realize these organizations don't have the means or manpower for security teams. Even ...
1 year ago Trendmicro.com
The dark side of Optimize Mac Storage: What you need to know if you rely on it - During the course of the past few days, it's become clear to me that there is a serious architectural problem with how Apple manages files on the Mac with iCloud, and that design flaw can lead to extensive data loss. If you have more data in your ...
1 year ago Zdnet.com
Tech Support Scammers Are Still At It: What To Look Out For - Tech scams are unfortunately still an issue in 2021, with technological advancements leading cybercriminals to find more creative ways to gain access to your data or charge you for services you don't need. As such, it's important to be aware of the ...
1 year ago Welivesecurity.com
Holistic Approach To Privacy and Security in Tech - In this article, I would like to explain how I tackle privacy and security issues that are specific for large scale web and mobile applications and Big Tech. First, let's outline some of the biggest challenges Big Tech companies deal with in terms of ...
6 months ago Feeds.dzone.com
Python 2 EOL: Coping with Legacy System Challenges - Python 2.7 was the last major version in the 2.x series of this software language, which was launched on July 3, 2010 and was officially maintained and supported until January 1, 2020. At that point, when the Python 2 EOL phase began, the legacy ...
6 months ago Securityboulevard.com
How to Set Up a VLAN in 12 Steps: Creation & Configuration - Each VLAN configuration process will look a little different, depending on the specifications you bring to the table, and some of these steps - particularly steps five through eight - may be completed simultaneously, in a slightly different order, or ...
6 months ago Esecurityplanet.com
How To Plan a MuleSoft VPN Migration - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 week ago Feeds.dzone.com
How To Plan a MuleSoft VPN Migration - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
6 days ago Feeds.dzone.com
How to lock a file or folder in MacOS Finder - Of course, when you have those types of sensitive documents, you'd want them stored more securely than within a locked file. If the files are less sensitive yet you still don't want anyone monkeying with them, MacOS Finder has a feature that can help ...
5 months ago Zdnet.com
VMware vCenter RCE Vulnerability: What You Need to Know - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 week ago Securityboulevard.com
Attack makes autonomous vehicle tech ignore road signs The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Theregister.com
Attack makes autonomous vehicle tech ignore road signs The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Theregister.com
AI helped X-Force hackers break into tech firm in 8 hours The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Go.theregister.com
CISA director: US 'not afraid' to probe holes in Big Tech The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 days ago Go.theregister.com
Meet the Ransomware Negotiators - We really thought it'd be really interesting for our listeners to know more about how it works in ransomware response process, how a company decides to pay the ransom, how that process works through a negotiator. I don't believe anybody really starts ...
1 week ago Darkreading.com
GitHub code-signing certificates stolen - Another day, another access-token-based database breach. This time, the victim is Microsoft's GitHub business. On December 6, 2022, repositories from our atom, desktop, and other deprecated GitHub-owned organizations were cloned by a compromised ...
1 year ago Nakedsecurity.sophos.com
Learn Cybersecurity Skills From Scratch for Just $30 Through January 1 - Save on tech services or switch to a lucrative new tech career in 2024 by training at your own pace to develop high-demand cybersecurity skills. On sale from 12/26 through 1/1. We may be compensated by vendors who appear on this page through methods ...
6 months ago Techrepublic.com
The Eureka Moment: Discovering Application Traffic Observability - If you've been part of a network segmentation or Zero Trust architecture planning project or a data center or application migration initiative, the following scenario probably rings true. You start by asking the application owners about the traffic ...
6 days ago Securityboulevard.com
Exploring the SIEM Environment Identifying and Overcoming Vendor Tricks - Are you fed up with the never-ending games and deceptive tactics used by security information and event management vendors? It's time to take control and make informed decisions. That's why we have decided to launch a series of blog posts to help ...
1 year ago Exabeam.com
Less is more: Conquer your digital clutter before it conquers you - In case you missed it, last week was Data Privacy Week, an awareness campaign to remind everybody that any of our online activities creates a trail of data and that we need to better manage our personal information online. Increasingly, we live our ...
1 year ago Welivesecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)