Securing Your Legacy Architecture: Why and How