SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news
Story image

BSA Report: 61% of Asia Pacific region at risk by using unlicensed software

FYI, this story is more than a year old

BSA's 2016 Global Software Report was released this week, which reflects the global and regional use of unlicensed software. The Asia-Pacific region has the highest rate of unlicensed software use: a 61% rate worth over $19.1 billion in commercial value.

Despite the overall high rate, unlicensed software use has been steadily dropping in every Asia-Pacific country since 2009.

BSA says the high regional rate in the Asia-Pacific region was driven by primarily by China's large market, with a commercial value of over $8.657 billion. While China's rate dropped by 4%, its increased share in the PC market increased the overall Asia-Pacific average. As a result, the Asia-Pacific rate only dropped 1%.

  • Bangladesh held the highest rate of unlicensed software use for a single country, with 86%, down from 91% in 2009. The unlicensed software is worth $236 million in commercial value
  • Australia's 2015 unlicensed software rate was 20%, down from 25% in 2009, worth $579 million in commercial value
  • New Zealand's unlicensed software rate was 18%, down from 22% in 2009, worth $66 million in commercial value
  • Global 2015 statistics showed that 39% of software was unlicensed. Furthermore, The unlicensed software rate is 25% in the banking, insurance and security industries.

    Global feedback from CIOs suggests that they are aware of the potential problems and security threats associated with using unlicensed software. The report says that CIOs are concerned about data loss from security breaches and the importance of using licensed software to prevent malicious attacks.

    CIOs estimate that 15% of employees load software on the network without permission, but employees admit that the rate is much higher at 26%. The report also says that 60% of employees understood the critical importance of using licensed software to prevent attacks.

    The BSA surveyed consumers, IT managers and enterprise PC users worldwide. The high rate of unlicensed software use has potentially damaging effects for businesses and users, because the high risk to cyber attacks and malware infections. The BSA says in 2015 cyber attacks caused $400 billion in damaged to businesses worldwide.

    The report advises businesses to use legal, licensed software. It also suggests using an in-house software management system to find the best software for their operations and to manage issues such as software retirement and replacement.

    Related stories
    Top stories
    Story image
    Malware
    Black Lotus Labs discovers new, multipurpose malware
    Black Lotus Labs, the threat intelligence team at Lumen, has discovered a new, rapidly growing, multipurpose malware written in the Go programming language.
    Story image
    Distributed Denial of Service
    Sysdig reveals a loss of $53 for every $1 cryptojackers gain
    The 2022 Sysdig Cloud Native Threat Report breaks down supply chain attacks against containers and how geopolitical conflict influences attacker behaviours.
    Story image
    Firewall
    Barracuda accelerates growth in its data protection business
    Barracuda cloud-to-cloud backup protects against evolving cyber threats, such as ransomware, and is now transactable in the Azure Marketplace.
    Story image
    Apple
    Jamf shows intent to acquire mobile security firm ZecOps
    This acquisition positions Jamf to help IT and security teams strengthen their organisation’s mobile security posture.
    Story image
    Work from home
    Jamf showcases new products to simplify and secure work
    At the 13th annual Jamf Nation User Conference, the company shared how its continuous product innovation is helping organisations succeed with Apple.
    Story image
    Network Management
    Fortinet introduces enhanced AIOps across its gateways
    FortiAIOps builds on Fortinet's rich history of developing artificial intelligence to deliver actionable network insights for self-optimising management.
    Story image
    Kaspersky
    Cybersecurity loopholes prevalent in South East Asia
    In terms of the share of vulnerabilities with publicly available exploits, three countries out of top five are located in Southeast Asia.
    Story image
    Cloud
    How modern IT architectures are moving beyond network visibility
    Dealing with multiple cloud providers makes it difficult to identify security threats and performance bottlenecks and troubleshoot issues.
    Story image
    Cloud Security
    75% of AU companies had cloud security incident in past year
    According to new Venafi research, complexity is due to increase, as companies plan to host more applications in the cloud.
    Story image
    Legacy
    Trellix enables greater cyber resiliency with extended XDR platform
    "Legacy SIEM technology has failed to modernise security operations. We are confident Trellix XDR fills this critical gap.”
    Story image
    Data Protection
    Cloudflare brings Data Localisation Suite to more APAC businesses
    This allows any business in these countries to service their data locally while benefiting from the speed, security, and scalability of Cloudflare’s global network.
    Story image
    Ransomware
    Commvault unveils early warning system, Metallic ThreatWise
    A first among data protection vendors, the new cyber deception service detects and contains ransomware threats.
    Story image
    Ransomware
    Delinea updates DevOps security, remote access more seamless
    New enhancements include development support on the most recent Mac computers and improved secrets' management usability through automation.
    Story image
    Phishing
    Vectra Protect team finds Microsoft Teams vulnerability
    The Vectra Protect team identified a post-exploitation opportunity in August, allowing malicious actors to steal valid user credentials from Microsoft Teams.
    Story image
    Cybersecurity
    Ransomware attacks continue to increase, report finds
    Nearly a quarter of businesses have suffered a ransomware attack, with a fifth occurring in the past 12 months.
    Story image
    Malware
    SonicWall threat report mid-year update highlights significant threat variance
    The 2022 SonicWall Cyber Threat Report mid-year update from SonicWall gives an in-depth insight into many of the current trends across the threat landscape.
    Story image
    Threat intelligence
    Trellix advances threat intelligence with new research centre
    Trellix has announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
    Story image
    Cybersecurity
    Kaspersky updates endpoint detection and response solution
    "One of the goals was to make all the solutions capabilities accessible for all types of our users, even those who are making their first steps in EDR."
    Story image
    Mobile Device Management
    How to easily scale your mobile workforce and devices for the peak shopping season
    Retailers are under constant pressure to streamline processes and become more efficient while looking for ways to improve customer satisfaction levels.
    AWS Marketplace
    Whitepaper: A practical guide for mitigating risk in today’s modern applications
    Link image
    Story image
    Cybersecurity
    Employees unsure who to go to to report security incident
    A new study shows more than 20% of the untrained global workforce do not know who to contact during a security breach.
    Story image
    Artificial Intelligence
    Ordr improves security and management of connected devices
    It has implemented more than 80 integrations within the Ordr Data Lake while adding security enhancements to accelerate zero trust segmentation.
    Story image
    Hybrid Cloud
    Hybrid cloud security driving need for deep observability
    Gigamon is bringing application and network-level intelligence together to help network, security, and cloud IT operations teams eliminate security blind spots.
    Story image
    Enterprise
    Delinea shares the importance of PAM, partners and security for modern enterprise
    Identity-based security is becoming a crucial tool for modern enterprises as they continue to adapt to different working environments.
    Story image
    Software-as-a-Service
    Varonis adds secrets discovery to data classification
    The data security firm announces enhancements that detect and remediate overexposed private keys, encryption certificates, API keys, and authentication tokens.
    Story image
    Virtual Private Network
    95% of organisation rely on VPN as threats continue - report
    There is a growing number of VPN-specific security threats and a need for Zero Trust security architecture in enterprise-level organisations.
    Story image
    Malware
    Cybereason delivers nation-state level of protection to enterprises
    Cybereason has announced new advancements in Cybereason NGAV that deliver nation-state level protection for organisations of all sizes.
    Story image
    Secure Code Warrior
    Secure Code Warrior announces Coding Labs innovation
    Coding Labs mechanisms allow developers to move from learning to applying secure coding knowledge more efficiently, leading to fewer code vulnerabilities.
    Story image
    Cybersecurity
    Macroeconomic headwinds driving security up priority list
    Current macroeconomic headwinds are driving security up enterprise’s priority list and reshaping the hardware Security Module market.
    Story image
    Cybersecurity
    StackHawk launches deeper API security test coverage
    Expansion of test coverage includes custom scan discovery, custom test scripts and custom test data for REST APIs.
    Story image
    Cybersecurity
    De-risking the innovation cycle – a modern, real-time approach to security
    Many organisations see cybersecurity as an inhibitor of innovation, with burdensome protection measures standing in the way of progress and speed.
    Story image
    Malware
    Kaspersky uncovers new malicious malware NullMixer
    Kaspersky researchers have uncovered a new malware stealing users credentials, address, credit card data, cryptocurrencies, and accounts.
    Story image
    Cybersecurity
    Video: 10 Minute IT Jams - An update from SearchInform
    Val Novoselova joins us today to to discuss new trends in the information security space, and how SearchInform is adapting to some of the new trends we are seeing.
    Aws Marketplace
    Learn how to implement a backup and recovery plan for a new generation of Kubernetes-based modern applications
    Link image
    Story image
    Software-as-a-Service
    Enterprises yet to fully commit to cybersecurity - CompTIA
    “Digital transformation driven by cloud and mobile adoption requires a new strategic approach to cybersecurity, but this poses significant challenges."
    Story image
    Cybersecurity
    Test your API Security with Infinite API Scanner
    The effectiveness of API scanning technology can mean the difference between successful and unsuccessful programming outcomes, and often enterprises and IT leaders struggle to get it right.
    Story image
    Edge Security
    Security practices for modernising the “spaghetti” of on-premises IT
    Many organisations are wondering how to securely modernise their workload, often made up of a “spaghetti” of on-premises applications and management consoles.
    Story image
    Malware
    Decrease in malware volume, but surge in encrypted malware
    The Q2 Internet Security Report found office exploits continue to spread more than any other category of malware.
    Story image
    Cybersecurity
    Best practices for industrial cyber resilience
    Operational technology (OT) security is gaining more attention than ever before, but sufficient understanding of what it takes to prevent breaches is still lacking amongst many organisations.
    Story image
    IT Training
    Six ways to transform your cybersecurity training and influence lasting change
    If the goal is to win hearts and minds, formal awareness training can fall short and often doesn’t inspire people to care.