Tweet Compliance and Enforcement, Cybersecurity

Using Legal Software to Reduce Cyber Vulnerabilities

Earlier this month, BSA member Microsoft partnered with the FBI and law enforcement authorities in more than 80 countries to break up a huge cybercrime ring that had managed to steal an estimated $500 million from bank accounts in the United States, Europe and Hong Kong. The perpetrators carried out their crimes by infecting millions of PCs with a virus that effectively turned them into zombies and then conscripted them into the service of malicious computer networks known as Citadel botnets. All told, the Microsoft-FBI–led enforcement operation took down 1,400 of these botnets.

While this Citadel case is noteworthy for its breadth and scope, it is just one example of a growing wave of cyber-threats that BSA members Symantec and McAfee document regularly. For example, Symantec’s 2013 Internet Security Threat Report found a 42 percent increase in targeted attacks last year. McAfee Labs is now tracking more than 128 million samples of malware affecting clients, servers, networks and mobile platforms.

There are basic security measures that all computer users should take to guard against the global problem of malware, from installing antivirus software to using strong passwords. But there is one measure that never gets enough billing: using legal software. As a body of research shows, pirated software is more vulnerable to attacks because it is less likely to be supported with critical security patches and updates.

For enterprises in particular, that’s a recipe for costly system malfunctions, downtime and IT repairs. It’s also a strong argument for proven software asset management programs like BSA’s SAM Advantage, which aligns with the International Organization for Standardization’s SAM standard.

As we said when we first introduced SAM Advantage, the value proposition of robust software asset management is simple: “Manage your assets. Minimize your risk. Maximize your returns.” Since then, we have incorporated feedback from SAM practitioners to improve the program. We have also launched a certification for entire organizations and a first-of-its-kind license-compliance registry called Verafirm.

There are any number of business reasons to accelerate adoption of these kinds of programs, from better operational performance to avoidance of unnecessary legal and financial risks. But as the recent Citadel botnet takedown shows, there is also a persuasive security rationale. No one wants their PC to be dragooned into service as a criminal zombie when there are common-sense ways to avoid it.

Author:

Jodie L. Kelley leads BSA’s domestic and international compliance & enforcement programs including its copyright-enforcement activities, its compliance policy work, its efforts against Internet crime, and its educational programs to promote software license compliance and respect for intellectual property. Kelley serves as BSA’s general counsel for all corporate matters and manages BSAs’ compliance & enforcement programs and counsel in Asia, Europe, the Middle East, Africa, and the Americas. Representing the largest copyright-based industry, BSA operates in more than 60 countries worldwide.

Prior to joining BSA, Kelley served for six years as Vice President and Deputy General Counsel of Fannie Mae, a government-sponsored enterprise chartered by Congress to provide liquidity, stability and affordability to the US housing and mortgage markets. There, she was responsible for managing the company’s litigation portfolio and its responses to various governmental inquiries. She also was responsible for advising the company on issues including antitrust and anti-fraud. Previously, she was a partner at Jenner & Block in Washington, where she specialized in civil and regulatory litigation and handled cases before trial and appellate courts and regulatory agencies throughout the country.

Kelley is a native of New Orleans, and a member of the Board of Directors of Commonwealth Academy. She earned her JD from Harvard Law School and BSS from The Pennsylvania State University.

Leave a Reply

Your email address will not be published. Required fields are marked *

nineteen − twelve =