Balancing Legacy and SaaS: Navigating Security Challenges in IT Transitions
August 11, 2025
Robert Buljevic, a Technology Consultant at Bridge IT, highlights the challenges organizations encounter when transitioning from legacy systems to Software as a Service (SaaS) applications, stressing the need to balance old and new technologies to maintain security.
The 'sunk cost fallacy' significantly impacts IT departments, causing them to continue investing in outdated systems rather than moving to more efficient cloud-based solutions, despite the higher long-term costs associated with maintaining legacy systems.
Many organizations struggle with the coexistence of legacy systems and SaaS, complicating security management and increasing the risk of human error, which can lead to potential security incidents.
For organizations reliant on traditional on-prem technologies like Microsoft Active Directory and VPNs, transitioning to Zero Trust Network Access (ZTNA) principles poses a challenge, leaving them vulnerable to sophisticated cyberattacks.
CISOs in mid-sized organizations should prioritize migrating email and productivity tools to SaaS, which will reduce reliance on legacy systems and implement stronger identity management protocols to enhance security while modernizing their infrastructure.
Organizations face external threats primarily from social engineering attacks and vulnerabilities in on-premises infrastructure, which cybercriminals exploit, underscoring the necessity for stronger security measures.
The uneven adoption of cloud services across Europe creates a wider attack surface, particularly in regions that are more cloud-averse, as legacy systems are targeted by threat actors due to their vulnerabilities.
Modernizing IT infrastructure by adopting SaaS solutions can simplify security management by reducing on-prem complexity, thereby enabling easier implementation of ZTNA principles and improving overall security posture.
Common mistakes during the transition to SaaS include failing to recognize the human element in security, which leads to inadequate training and preparedness against phishing attacks, often the cause of breaches.
Summary based on 1 source
Get a daily email with more Cybersecurity stories
Source

Help Net Security • Aug 11, 2025
From legacy to SaaS: Why complexity is the enemy of enterprise security - Help Net Security