Most organizations have at least some old hardware and software still in use. The main problem with out-of-date software and legacy hardware is that once they pass their EOL cycle, the vendor no longer maintains or supports the products. Many organizations are unaware of the potential liabilities, which can cost millions of dollars in the case of a successful attack after a vulnerability is exploited. Heres a look at the hardware, software and mobile device vulnerabilities you should tackle now to reduce risk and increase security.”]

