Malware Threats from Unlicensed Software: Real or Imagined?

posted by in Compliance and Enforcement, Cybersecurity February 18, 2015
Feb 18

It has long been assumed that there is a connection between unlicensed software and cyber security threats. In fact, BSA’s most recent Global Software Survey found that computer users cite exposure to cybersecurity threats from malware as the chief reason not to use unlicensed software.

Malware_ThreatsTo test whether this relationship is indeed real or imagined, BSA commissioned a new analysis from global research firm IDC comparing rates of unlicensed software installed on PCs with a measure of malware incidents on PCs across 81 countries. The results show there is a strong positive correlation between unlicensed software and malware encounters – the higher the unlicensed software rate in a country, the more malware generally encountered on PCs in that country, and vice versa. In statistical terms, the correlation between unlicensed software and malware (r=0.79) is on par with that of a low carb diet and weight loss (r=0.79); and even higher than the correlation between smoking and lung cancer (r=0.72) and education and income (r=0.75).

There is good reason for organizations to put protection from malware at the top of their risk agenda.  The problem is pervasive and costly.  Every three minutes the average organization experiences a malware event and much of that malware can cause serious issues.  Indeed, 43 percent of companies experienced a data breach during the past year.  And the costs associated with such breaches can be astronomical. IDC estimates that enterprises will have spent $491 billion in 2014 as a result of malware associated with counterfeit and unlicensed software.

It is clear why business leaders are looking to manage these organizational risks and mitigate their exposure.

Given the clear link between cybersecurity threats and unlicensed software, one of the simplest ways for enterprises and governments to better safeguard their organizations is to ensure that the software they are running is genuine and fully licensed. Good software management is a threshold step, and it’s an absolutely critical one.

Internal compliance controls, such as software asset management, can reduce exposure to cyber threats by helping organizations understand what software they have on their networks, verify that it is genuine, and confirm that they are in compliance with their software license obligations.

The link between unlicensed software and malware is real. Ensuring the software installed on your systems is licensed and comes from a legitimate source is a good first line of defense. By practicing good software asset management, you are taking the first few, threshold steps toward securing and protecting your systems.

Supreme Court Action on Patents Leaves Room for Reform

posted by in Intellectual Property February 12, 2015
Feb 12

Today, the House Judiciary Committee’s Subcommittee on Courts, Intellectual Property and the Internet held a hearing to examine recent Supreme Court cases in the patent arena. The hearing was carefully watched by opponents and supporters of the Innovation Act (HR 9), a bipartisan patent litigation reform bill introduced last week.

BSA and its member companies strongly support the Innovation Act. The bill is carefully crafted to curb abusive practices in patent litigation and to address asymmetries in the cost of patent litigation that provide incentives to assert weak patents and meritless infringement claims. Today’s hearing made clear that, while the Supreme Court has taken steps to correct imbalances in patent litigation, meaningful change lies beyond the Court’s role in interpreting existing law. (more…)

Pick up the pace on a Transatlantic Trade and Investment Partnership

posted by in Global Markets February 5, 2015
Feb 05

EU and US negotiators have come to the table in Brussels this week to continue discussions on a Transatlantic Trade and Investment Partnership (TTIP).

No one ever said negotiating trade agreements was easy. But if these two countries act now, the benefits will be far reaching.

TTIP was envisioned as an ambitious opportunity for the US and EU – two of the world’s most important economies – to simplify and grow trade and business opportunities between their two markets. One study commissioned by the European Commission projects that TTIP could result in an increase of €119 billion in EU GDP and €95 billion in the US, and increase global income by almost €100 billion by 2027. (more…)

Tags , , ,

Executive Survey Shows the Benefits of Data Innovation Across the Whole Economy

posted by in Data, Global Markets December 10, 2014
Dec 10

HomepageFeature_datasurvey

There are pervasive myths and misconceptions about how data innovation is transforming the global economy, from the idea that it’s all about so-called “Big Data” (in fact, analyzing even small data sets can produce useful insights) to the false notion that all data is personal information (when discoveries are being made from data sources such as wind turbines, jet engines, financial markets, crop harvests, traffic patterns and energy consumption).

Today we released a new survey that sets right another such myth — that big tech companies and Silicon Valley start-ups are the main beneficiaries of data innovation. The reality is that data tools are catalysts for innovation and growth across the whole economy, and the benefits of that innovation and growth accrue to society as a whole. (more…)

Pass Surveillance Reform Now

posted by in Data November 14, 2014
Nov 14

BSA | The Software Alliance and other leading technology groups sent the followng letter on September 8, 2014, to the US Senate calling for a swift vote on the USA Freedom Act. The bipartisan legislation would strengthen privacy protections for the public by reforming the Foreign Intelligence Surveillance Act (FISA). Click here for the letter in pdf format.

 

September 8, 2014

Dear Majority Leader Reid and Republican Leader McConnell:

The undersigned trade associations and organizations, representing leaders in the technology sector, write to urge your support for the bipartisan USA FREEDOM Act, S. 2685, introduced on July 29, 2014 by Senators Leahy, Franken, Lee, and Heller. (more…)

Time to Break the Logjam on ECPA Reform

posted by in Data October 21, 2014
Oct 21

No one can argue convincingly that the email, photos and documents we store electronically are any less important to our personal and professional lives than the ones we keep on paper. Yet they are still held to different standards: Authorities need a warrant to search an old-fashioned file cabinet, but not your hard drive or email account.

That’s because the law that governs access to digital records, the Electronic Communications Privacy Act, or ECPA, turns 28 years old this week. It was enacted in 1986 — well before anyone but a small handful of scientists and academics had ever used the Internet — and it is long overdue for reform. Addressing this issue is an important step in building public trust in the innovative technologies at the heart of the digital economy. (more…)

Tags , ,

Privacy Protection Is at Stake in Microsoft’s Battle with the DOJ

posted by in Data July 28, 2014
Jul 28

Technology has fundamentally changed the way we all store our information, and that has put technology companies on the front lines of the fight to ensure private data are protected as well in the digital age as in the past. This fight is now playing out in a lawsuit in New York, where the US government is urging a court to ignore the true nature of digitally stored information so that it can avoid clear limits on search-and-seizure authority. The court should instead reaffirm limits on government power to preserve critical privacy protections.

Up on appeal is a case from the US District Court in the Southern District of New York in which the government served Microsoft Corp. with a search warrant directing it to produce the contents of a customer’s email account. Microsoft determined that it had stored the content on a server in Dublin. Rather than produce the email content, the company produced only data stored in the United States and moved to dismiss the warrant to conduct an exterritorial search at the government’s behest. (more…)

BSA Global Survey Reveals Security Concerns With Unlicensed Software — and Points to the Solution

posted by in Intellectual Property June 24, 2014
Jun 24

bsa_report_interior
Of all the priorities CIOs and IT managers are juggling these days — from cloud to mobility to data analytics — surveys find that cybersecurity is what keeps them up at night. And there’s good reason for that: Symantec dubbed 2013 the “Year of the Mega Breach” while the Economist Intelligence Unit found that more than 75 percent of organizations suffered a security incident in the past two years causing major system disruption or loss of sensitive data. (more…)

Positive Shift in Europe’s Approach to Cloud Policy

posted by in Cloud Computing May 2, 2014
May 02

Policy discussions about cloud computing in Europe have at times been fraught with protectionist rhetoric. Exacerbated by Edward Snowden’s revelations on government surveillance, there have been calls for data location requirements, procurement preferences for European providers, dedicated French or German cloud networks, and even a “Schengen area for data” as ways to promote deployment of cloud services wholly focused on the European market.

While BSA fully supports efforts to promote cloud computing in the EU, these types of policies would run contrary to the borderless nature of the cloud and hamper, not encourage, cloud uptake. (more…)

Restoring Confidence in the Digital Economy

posted by in Data, Global Markets April 10, 2014
Apr 10

How do we restore trust and confidence in the underpinnings of the digital economy in the wake of unsettling disclosures about international surveillance practices?

That question is top of mind for policymakers in the US and European Union as they ponder the possibility of a grand, new transatlantic trade and investment partnership. As I noted in speeches this week in Brussels and Paris, getting the answer right will be critical if we are going to capture maximum benefit from the kinds of software innovations that are transforming everything from the way manufacturers manage their supply chains to the way doctors provide healthcare. (more…)