Tag legacy cybersecurity limitations