Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

7/2/2013
04:47 PM
Doug Landoll
Doug Landoll
Commentary
50%
50%

License To Ill

Unlicensed software exposes SMBs to lawsuits, viruses, and unwelcome guests

Computer software accelerates the ability of businesses to communicate, collaborate, design, build, and deliver. Expensive as some of these products may be, it's hard to imagine getting business done without them. While SMBs are always looking to cut costs and maintain effectiveness, shortcutting the software licensing process can have dangerous consequences from a lack of software support to potentially company-ending fines and security holes.

Although not on the top of the list of SMB owner concerns, the issue of unlicensed software is critical. Unlicensed software is much more of a problem than many would believe. It is said that 20 percent of software products installed is unlicensed or counterfeit. Moreover, the SMB space seems the most impacted by efforts to stem the practice of stealing software IP. The Business Software Alliance (BSA) is an organization that has been given legal authority from many software vendors to investigate reported instances of software theft (mostly reported from ex-employees who get a reward from the BSA). In a recent study, the BSA reported that 90 percent of the monies collected from such fines and lawsuits came from small businesses. Now, most SMB owners or directors would not knowing install or look the other way for such an important issue, but the unlicensed software still creeps its way into your organization in three ways:

1) Lack of clear policies and oversight. Few organizations make it clear that the business will not put up with intellectual property theft and unauthorized software installed on their systems. Unclear policy and direction lead to a degradation of culture and permissiveness that leave the business open to such vulnerabilities.

2) Sloppy asset management. Many times computers moved from one department to another simply retain the software installed on it, whether needed or not. After just a few moves the organization is using more licenses than it planned or paid for.

3) IT service provider shortcuts. Many IT service providers use their knowledge of how to install multiple copies of vendor software to cheaply provide software suites to all company workstations or servers. Lack of follow-up on the proper licensing process turns those installed instances into unlicensed software.

This is not just a legal issue, but also a major security issue. In addition to instilling a poor company culture, illegal software can contain malware or, left unpatched, lead to damaging security holes. A recent study found that more than one-third of downloaded pirated software contained malware. As for "legitimate" copies of software that simply are not registered, these installations have not access to critical patches, so they are just a "patch Tuesday" away from inviting the world into your systems.

To protect the businesses they have built, SMBs need to ensure they respect intellectual property and ensure they have legitimate and licensed software.

1) Have an independent software license review. Independence here is paramount. Such a review from your IT provider or department gives little to no assurance.

2) Update/create policies to reflect intellectual property protection, reporting of violations, and prohibition of unauthorized software.

Doug Landoll, CEO of Assero Security Doug Landoll is an expert in information security for the SMB market with over 20 years experience securing businesses and government agencies. He has written several information security books and dozens of articles for national publications. He has founded and ran four ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Well I dont run on MacOS, so I need to take extra precautions"
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18623
PUBLISHED: 2020-06-02
Grafana 5.3.1 has XSS via the "Dashboard > Text Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
CVE-2018-18624
PUBLISHED: 2020-06-02
Grafana 5.3.1 has XSS via a column style on the "Dashboard > Table Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
CVE-2018-18625
PUBLISHED: 2020-06-02
Grafana 5.3.1 has XSS via a link on the "Dashboard > All Panels > General" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
CVE-2019-11843
PUBLISHED: 2020-06-02
The MailPoet plugin before 3.23.2 for WordPress allows remote attackers to inject arbitrary web script or HTML using extra parameters in the URL (Reflective Server-Side XSS).
CVE-2020-5410
PUBLISHED: 2020-06-02
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL t...