Old code still underpins systems from airlines to banking, presenting not just a potential security risk, but also a risk that you might not be able to find developers to fix the issues
Is your IT infrastructure so restrictive it's forcing your staff to use unauthorised 'shadow' infrastructure? If so, it's time to have another look at your policies