Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

7/2/2013
04:47 PM
Doug Landoll
Doug Landoll
Commentary
50%
50%

License To Ill

Unlicensed software exposes SMBs to lawsuits, viruses, and unwelcome guests

Computer software accelerates the ability of businesses to communicate, collaborate, design, build, and deliver. Expensive as some of these products may be, it's hard to imagine getting business done without them. While SMBs are always looking to cut costs and maintain effectiveness, shortcutting the software licensing process can have dangerous consequences from a lack of software support to potentially company-ending fines and security holes.

Although not on the top of the list of SMB owner concerns, the issue of unlicensed software is critical. Unlicensed software is much more of a problem than many would believe. It is said that 20 percent of software products installed is unlicensed or counterfeit. Moreover, the SMB space seems the most impacted by efforts to stem the practice of stealing software IP. The Business Software Alliance (BSA) is an organization that has been given legal authority from many software vendors to investigate reported instances of software theft (mostly reported from ex-employees who get a reward from the BSA). In a recent study, the BSA reported that 90 percent of the monies collected from such fines and lawsuits came from small businesses. Now, most SMB owners or directors would not knowing install or look the other way for such an important issue, but the unlicensed software still creeps its way into your organization in three ways:

1) Lack of clear policies and oversight. Few organizations make it clear that the business will not put up with intellectual property theft and unauthorized software installed on their systems. Unclear policy and direction lead to a degradation of culture and permissiveness that leave the business open to such vulnerabilities.

2) Sloppy asset management. Many times computers moved from one department to another simply retain the software installed on it, whether needed or not. After just a few moves the organization is using more licenses than it planned or paid for.

3) IT service provider shortcuts. Many IT service providers use their knowledge of how to install multiple copies of vendor software to cheaply provide software suites to all company workstations or servers. Lack of follow-up on the proper licensing process turns those installed instances into unlicensed software.

This is not just a legal issue, but also a major security issue. In addition to instilling a poor company culture, illegal software can contain malware or, left unpatched, lead to damaging security holes. A recent study found that more than one-third of downloaded pirated software contained malware. As for "legitimate" copies of software that simply are not registered, these installations have not access to critical patches, so they are just a "patch Tuesday" away from inviting the world into your systems.

To protect the businesses they have built, SMBs need to ensure they respect intellectual property and ensure they have legitimate and licensed software.

1) Have an independent software license review. Independence here is paramount. Such a review from your IT provider or department gives little to no assurance.

2) Update/create policies to reflect intellectual property protection, reporting of violations, and prohibition of unauthorized software.

Doug Landoll, CEO of Assero Security Doug Landoll is an expert in information security for the SMB market with over 20 years experience securing businesses and government agencies. He has written several information security books and dozens of articles for national publications. He has founded and ran four ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15113
PUBLISHED: 2019-08-16
The companion-sitemap-generator plugin before 3.7.0 for WordPress has CSRF.
CVE-2019-15114
PUBLISHED: 2019-08-16
The formcraft-form-builder plugin before 1.2.2 for WordPress has CSRF.
CVE-2019-15115
PUBLISHED: 2019-08-16
The peters-login-redirect plugin before 2.9.2 for WordPress has CSRF.
CVE-2019-15116
PUBLISHED: 2019-08-16
The easy-digital-downloads plugin before 2.9.16 for WordPress has XSS related to IP address logging.
CVE-2017-18547
PUBLISHED: 2019-08-16
The nelio-ab-testing plugin before 4.6.4 for WordPress has CSRF in experiment forms.