Based on cybersecurity best practices, we do not support legacy systems as they post a high cybersecurity risk to the company using it, and to the IT provider that supports it.
This exposes both parties and their critical internal and client data to cyber threats like hackers, and/or malware.