Endpoint
7/2/2013
04:47 PM
Doug Landoll
Doug Landoll
Commentary
50%
50%

License To Ill

Unlicensed software exposes SMBs to lawsuits, viruses, and unwelcome guests

Computer software accelerates the ability of businesses to communicate, collaborate, design, build, and deliver. Expensive as some of these products may be, it's hard to imagine getting business done without them. While SMBs are always looking to cut costs and maintain effectiveness, shortcutting the software licensing process can have dangerous consequences from a lack of software support to potentially company-ending fines and security holes.

Although not on the top of the list of SMB owner concerns, the issue of unlicensed software is critical. Unlicensed software is much more of a problem than many would believe. It is said that 20 percent of software products installed is unlicensed or counterfeit. Moreover, the SMB space seems the most impacted by efforts to stem the practice of stealing software IP. The Business Software Alliance (BSA) is an organization that has been given legal authority from many software vendors to investigate reported instances of software theft (mostly reported from ex-employees who get a reward from the BSA). In a recent study, the BSA reported that 90 percent of the monies collected from such fines and lawsuits came from small businesses. Now, most SMB owners or directors would not knowing install or look the other way for such an important issue, but the unlicensed software still creeps its way into your organization in three ways:

1) Lack of clear policies and oversight. Few organizations make it clear that the business will not put up with intellectual property theft and unauthorized software installed on their systems. Unclear policy and direction lead to a degradation of culture and permissiveness that leave the business open to such vulnerabilities.

2) Sloppy asset management. Many times computers moved from one department to another simply retain the software installed on it, whether needed or not. After just a few moves the organization is using more licenses than it planned or paid for.

3) IT service provider shortcuts. Many IT service providers use their knowledge of how to install multiple copies of vendor software to cheaply provide software suites to all company workstations or servers. Lack of follow-up on the proper licensing process turns those installed instances into unlicensed software.

This is not just a legal issue, but also a major security issue. In addition to instilling a poor company culture, illegal software can contain malware or, left unpatched, lead to damaging security holes. A recent study found that more than one-third of downloaded pirated software contained malware. As for "legitimate" copies of software that simply are not registered, these installations have not access to critical patches, so they are just a "patch Tuesday" away from inviting the world into your systems.

To protect the businesses they have built, SMBs need to ensure they respect intellectual property and ensure they have legitimate and licensed software.

1) Have an independent software license review. Independence here is paramount. Such a review from your IT provider or department gives little to no assurance.

2) Update/create policies to reflect intellectual property protection, reporting of violations, and prohibition of unauthorized software.

Doug Landoll, CEO of Assero Security Doug Landoll is an expert in information security for the SMB market with over 20 years experience securing businesses and government agencies. He has written several information security books and dozens of articles for national publications. He has founded and ran four ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0714
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

CVE-2014-3598
Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

CVE-2014-8361
Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

CVE-2015-0237
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

CVE-2015-0257
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.