Gadget

Risky business for a third of software on SA PCs

Fewer South African companies are using unlicensed software, opting to avoid the numerous security threats associated with counterfeit software, but one in three copies of software installed on local PCs during 2013 was still not properly licensed.

The commercial value of the unlicensed software is R4,11-billion. According to the latest BSA Global Software Survey, which states that there has been a 1 percentage-point decrease in the use of unlicensed software since 2011. The survey is conducted every second year by market research firm IDC and this year polled PC users in 34 markets including nearly 22,000 consumer and business users and more than 2,000 IT managers. BSA │ The Software Alliance is a non-profit trade association established to advance the goals of the software industry and its hardware partners and the organisation also represents Adobe, Autodesk and Noctranet and Symantec in South Africa.

Hopefully this drop signals the start of a downward trend,” says Marius Haman, chair of the South Africa committee of BSA ‚îÇ The Software Alliance and corporate attorney in the Digital Crimes Unit, Legal & Corporate Affairs at Microsoft Middle East & Africa. “Compared to unlicensed products, properly licensed software offers computer users more peace of mind when it comes to operational efficiency and security. Corporate users and general PC users are starting to view this peace of mind as an important component of success in business.

Pirate software – the digital equivalent of a Trojan horse of hackers

The biggest deterrent to using unlicensed software is being hacked or having your data stolen, as 64% of global computer users cited unauthorised access by hackers as a top threat while 59% of respondents cited loss of data.

This paranoia over malicious software being added into pirated software is not unfounded as the risks of using unlicensed software goes beyond breaking the law and infringing intellectual property rights of software vendors.

In a research whitepaper entitled The Dangerous World of Counterfeit and Pirated Software, IDC found that 78% of unlicensed software downloads included some form of tracking cookie or spyware installations. These install itself on a user’s PC and reports personal information without their knowledge such as credit card data, passwords and email contact lists that can all be exploited by cybercriminals.

When it comes to Trojans and other malicious adware, 27% of the downloaded counterfeit software incorporated these, which at best threaten a computer’s performance and may even cause it to crash, leading to costs in terms data and productivity losses. In the worst case scenario, the malicious software may also perform actions that are not authorised by the PC user like data deletion or copying of corporate information.

Often malicious software also prevents the installation of patches that Microsoft and other software vendors send to fix any vulnerability that hackers exploit, causing PC to remain vulnerable.

In spite of the potential damage that unlicensed software might cause to PC systems and networks, less than half of IT managers are very confident that their company’s software is properly licensed. Moreover, only 35% of businesses worldwide have written policies put in place that expressly require the use of properly licensed software.

Business should ensure that they only purchase software from reputable companies, as a seller proposing to violate copyright law could just as easily view your credit card data or personal information as another source of revenue that can be sold to identity thieves,” warned Dale Waterman, who leads the Microsoft Digital Crimes Unit in the Middle East and Africa region.

Waterman added that the use of unlicensed software can easily be deterred within the business environment through the establishment of a formal policy on licensed software use. South African organisations have to consider implementing more robust software asset management programs that ensure adequate controls are in place to provide a full view into what is installed on a network, and help to avoid the occurrence of security and operational risks.

* Follow Gadget on Twitter on @GadgetZA

Exit mobile version