​Insecure legacy systems make securing any enterprise an uphill battle. There is now broad consensus among security professionals that protecting these systems well enough to prevent any compromise is usually not possible when faced with a determined adversary. Given the risk of compromise, it is important to monitor co-op systems rigorously and to be ready to respond quickly and effectively to a breach.