{"id":350,"date":"2016-08-05T11:47:13","date_gmt":"2016-08-05T17:47:13","guid":{"rendered":"https:\/\/www.morphis-insights.com\/?p=350"},"modified":"2024-01-26T11:10:19","modified_gmt":"2024-01-26T11:10:19","slug":"become-complacent-security-risks","status":"publish","type":"post","link":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/","title":{"rendered":"Have We Become Complacent With Security Risks?"},"content":{"rendered":"<p>Of course, most of the world\u2019s businesses are aware of the fact that a security breach could be detrimental to their business. But why is it that the \u201coutdated software turns into nightmare for customers\u201d headline continues to appear almost daily? At this point, <a href=\"http:\/\/www.zdnet.com\/pictures\/biggest-hacks-security-data-breaches-2015\/\" target=\"_blank\" rel=\"noopener\">almost every American has been affected by at least one data breach this year<\/a>.<\/p>\n<p>Take Carphone Warehouse, one of the UK\u2019s top retailers for cellular devices yet responsible for the <a href=\"http:\/\/www.zdnet.com\/pictures\/biggest-hacks-security-data-breaches-2015\/11\/\" target=\"_blank\" rel=\"noopener\">UK&#8217;s biggest data breach of the year<\/a>. As many as 2.4 million customers (roughly four percent of the country&#8217;s population) had their personal information, including credit card data, taken in the breach that was caused by a cyber attack against outdated security measures in the retailer\u2019s software<\/p>\n<p>Sebastian James, Chief Executive of Dixons Carphone, the retailer\u2019s owner, mentioned in an interview that the company has since \u201cput in place additional security measures.\u201d While this is nice, it would have been best if customers knew that all possible security measures were already in place prior to the breach and that security holes in the company\u2019s software did not exist in the first place.<\/p>\n<p>For a company (created by the merger of Carphone Warehouse and Dixons Retail) that just reported a <a href=\"http:\/\/www.bbc.com\/news\/business-36659680\" target=\"_blank\" rel=\"noopener\">17% jump in profitability this year<\/a>, the question remains: when will companies choose to invest in their technology and put the security of their customer\u2019s personal information ahead of short-term profits?<\/p>\n<p>This year alone, we\u2019ve watched as successful, profitable banks, airlines, major retailers, hotels, and other major multi-million (and billion) dollar companies have experienced breach after breach. So what is holding companies back from updating their legacy systems?<\/p>\n<ul>\n<li>Is it that the <a href=\"https:\/\/www.morphis-insights.com\/modernize-or-die\/\" target=\"_blank\" rel=\"noopener\">tenure of C-level execs is so short<\/a> that tackling problems perceived to be really difficult is unattractive and can be left to the next incumbent?<\/li>\n<li>Is it that risk-taking (i.e. tackling perceived difficult challenges such as upgrading legacy systems) <a href=\"https:\/\/www.morphis-insights.com\/innovation-challenge\/\" target=\"_blank\" rel=\"noopener\">is \u201cdiscouraged\u201d in today\u2019s large enterprise?<\/a><\/li>\n<li>Is it that people don\u2019t where to start? Which applications? Why and how?<\/li>\n<\/ul>\n<p>Firstly, modernizing legacy systems <a href=\"https:\/\/www.morphis-insights.com\/miami-dade-county-case-study\/\" target=\"_blank\" rel=\"noopener\">is not as difficult (or as expensive) as it seems<\/a> and it\u2019s way easier than being that next headline and dealing with denial of service, loss of customers\u2019 personal information or even resultant identity theft.<\/p>\n<p>Our White Paper on <a href=\"https:\/\/www.morphis-insights.com\/breaking-the-shackles-lp\/\" target=\"_blank\" rel=\"noopener\">Breaking the Shackles of Legacy Systems<\/a> will help with the process of identifying which apps are candidates for modernization and then which the best approach would be.<\/p>\n<p>At Morphis, we recognize that legacy systems are daunting, even for CIOs with large budgets at their disposal. Like many things, just starting the process can seem too difficult. This is why we\u2019ve created the free Morphis Inspector Tool. Watch for further details on accessing this tool to produce first order complexity estimates for your applications and then modernization costs and timescales. Don\u2019t be the next headline!!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Of course, most of the world\u2019s businesses are aware of the fact that a security breach could be detrimental to their business. But why is it that the \u201coutdated software turns into nightmare for customers\u201d headline continues to appear almost daily? At this point, almost every American has been affected by at least one data [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":349,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[82],"tags":[107],"class_list":["post-350","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-modernization","tag-retail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Outdated Legacy Systems Create Nightmare for Customers<\/title>\n<meta name=\"description\" content=\"Why is it that the \u201coutdated software turns into nightmare for customers\u201d headline continues to appear almost daily? Don&#039;t be the next headline! Start here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Outdated Legacy Systems Create Nightmare for Customers\" \/>\n<meta property=\"og:description\" content=\"Why is it that the \u201coutdated software turns into nightmare for customers\u201d headline continues to appear almost daily? Don&#039;t be the next headline! Start here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Morphis-Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-05T17:47:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-26T11:10:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/08\/e5-carphone.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"775\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bruno Andrade\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruno Andrade\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/\"},\"author\":{\"name\":\"Bruno Andrade\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275\"},\"headline\":\"Have We Become Complacent With Security Risks?\",\"datePublished\":\"2016-08-05T17:47:13+00:00\",\"dateModified\":\"2024-01-26T11:10:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/\"},\"wordCount\":490,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/08\/e5-carphone.jpg\",\"keywords\":[\"Retail\"],\"articleSection\":[\"Application Modernization\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/\",\"url\":\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/\",\"name\":\"Outdated Legacy Systems Create Nightmare for Customers\",\"isPartOf\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/08\/e5-carphone.jpg\",\"datePublished\":\"2016-08-05T17:47:13+00:00\",\"dateModified\":\"2024-01-26T11:10:19+00:00\",\"description\":\"Why is it that the \u201coutdated software turns into nightmare for customers\u201d headline continues to appear almost daily? Don't be the next headline! Start here.\",\"breadcrumb\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#primaryimage\",\"url\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/08\/e5-carphone.jpg\",\"contentUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/08\/e5-carphone.jpg\",\"width\":1170,\"height\":775,\"caption\":\"Carphone Warehouse\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/morphis-tech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Have We Become Complacent With Security Risks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#website\",\"url\":\"https:\/\/morphis-tech.com\/blog\/\",\"name\":\"Legacy Modernization - Blog\",\"description\":\"Legacy to Cloud\",\"publisher\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/morphis-tech.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\",\"name\":\"Morphis Tech\",\"url\":\"https:\/\/morphis-tech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg\",\"contentUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg\",\"width\":344,\"height\":51,\"caption\":\"Morphis Tech\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/morphis_technologies\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275\",\"name\":\"Bruno Andrade\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g\",\"caption\":\"Bruno Andrade\"},\"url\":\"https:\/\/morphis-tech.com\/blog\/author\/bruno-andrade\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Outdated Legacy Systems Create Nightmare for Customers","description":"Why is it that the \u201coutdated software turns into nightmare for customers\u201d headline continues to appear almost daily? Don't be the next headline! Start here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/","og_locale":"en_GB","og_type":"article","og_title":"Outdated Legacy Systems Create Nightmare for Customers","og_description":"Why is it that the \u201coutdated software turns into nightmare for customers\u201d headline continues to appear almost daily? Don't be the next headline! Start here.","og_url":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/","og_site_name":"Morphis-Tech Blog","article_published_time":"2016-08-05T17:47:13+00:00","article_modified_time":"2024-01-26T11:10:19+00:00","og_image":[{"width":1170,"height":775,"url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/08\/e5-carphone.jpg","type":"image\/jpeg"}],"author":"Bruno Andrade","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruno Andrade","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#article","isPartOf":{"@id":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/"},"author":{"name":"Bruno Andrade","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275"},"headline":"Have We Become Complacent With Security Risks?","datePublished":"2016-08-05T17:47:13+00:00","dateModified":"2024-01-26T11:10:19+00:00","mainEntityOfPage":{"@id":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/"},"wordCount":490,"commentCount":0,"publisher":{"@id":"https:\/\/morphis-tech.com\/blog\/#organization"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/08\/e5-carphone.jpg","keywords":["Retail"],"articleSection":["Application Modernization"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/","url":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/","name":"Outdated Legacy Systems Create Nightmare for Customers","isPartOf":{"@id":"https:\/\/morphis-tech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#primaryimage"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/08\/e5-carphone.jpg","datePublished":"2016-08-05T17:47:13+00:00","dateModified":"2024-01-26T11:10:19+00:00","description":"Why is it that the \u201coutdated software turns into nightmare for customers\u201d headline continues to appear almost daily? Don't be the next headline! Start here.","breadcrumb":{"@id":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#primaryimage","url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/08\/e5-carphone.jpg","contentUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/08\/e5-carphone.jpg","width":1170,"height":775,"caption":"Carphone Warehouse"},{"@type":"BreadcrumbList","@id":"https:\/\/morphis-tech.com\/blog\/become-complacent-security-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/morphis-tech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Have We Become Complacent With Security Risks?"}]},{"@type":"WebSite","@id":"https:\/\/morphis-tech.com\/blog\/#website","url":"https:\/\/morphis-tech.com\/blog\/","name":"Legacy Modernization - Blog","description":"Legacy to Cloud","publisher":{"@id":"https:\/\/morphis-tech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/morphis-tech.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/morphis-tech.com\/blog\/#organization","name":"Morphis Tech","url":"https:\/\/morphis-tech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg","contentUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg","width":344,"height":51,"caption":"Morphis Tech"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/morphis_technologies\/"]},{"@type":"Person","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275","name":"Bruno Andrade","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g","caption":"Bruno Andrade"},"url":"https:\/\/morphis-tech.com\/blog\/author\/bruno-andrade\/"}]}},"_links":{"self":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/comments?post=350"}],"version-history":[{"count":1,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/350\/revisions"}],"predecessor-version":[{"id":6941,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/350\/revisions\/6941"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/media\/349"}],"wp:attachment":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/media?parent=350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/categories?post=350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/tags?post=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}