Legacy systems often rely on outdated protocols that may not have the necessary security features to protect against modern threats. This can lead to vulnerabilities that attackers can exploit, compromising the integrity, confidentiality, and availability of the system and its data.