SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news
Story image

BSA Report: 61% of Asia Pacific region at risk by using unlicensed software

By Sara Barker
Thu 26 May 2016
FYI, this story is more than a year old

BSA's 2016 Global Software Report was released this week, which reflects the global and regional use of unlicensed software. The Asia-Pacific region has the highest rate of unlicensed software use: a 61% rate worth over $19.1 billion in commercial value.

Despite the overall high rate, unlicensed software use has been steadily dropping in every Asia-Pacific country since 2009.

BSA says the high regional rate in the Asia-Pacific region was driven by primarily by China's large market, with a commercial value of over $8.657 billion. While China's rate dropped by 4%, its increased share in the PC market increased the overall Asia-Pacific average. As a result, the Asia-Pacific rate only dropped 1%.

  • Bangladesh held the highest rate of unlicensed software use for a single country, with 86%, down from 91% in 2009. The unlicensed software is worth $236 million in commercial value
  • Australia's 2015 unlicensed software rate was 20%, down from 25% in 2009, worth $579 million in commercial value
  • New Zealand's unlicensed software rate was 18%, down from 22% in 2009, worth $66 million in commercial value
  • Global 2015 statistics showed that 39% of software was unlicensed. Furthermore, The unlicensed software rate is 25% in the banking, insurance and security industries.

    Global feedback from CIOs suggests that they are aware of the potential problems and security threats associated with using unlicensed software. The report says that CIOs are concerned about data loss from security breaches and the importance of using licensed software to prevent malicious attacks.

    CIOs estimate that 15% of employees load software on the network without permission, but employees admit that the rate is much higher at 26%. The report also says that 60% of employees understood the critical importance of using licensed software to prevent attacks.

    The BSA surveyed consumers, IT managers and enterprise PC users worldwide. The high rate of unlicensed software use has potentially damaging effects for businesses and users, because the high risk to cyber attacks and malware infections. The BSA says in 2015 cyber attacks caused $400 billion in damaged to businesses worldwide.

    The report advises businesses to use legal, licensed software. It also suggests using an in-house software management system to find the best software for their operations and to manage issues such as software retirement and replacement. 

    Related stories
    Top stories
    Story image
    Artificial Intelligence
    How to ensure ethical deployment of AI implentations
    The increase in automation and machine technology such as AI and machine learning has unlocked a whole new level of scale and service to organisations. 
    Story image
    Digital Transformation
    How to modernise legacy apps without compromising security
    At a time when digital transformation has become central to business, even the most important applications come with a ‘use-by’ date.
    Story image
    Ransomware
    A third of companies paying ransom don’t recover data - report
    Veeam's report finds 76% of businesses who are victims of cyberattacks paid the ransom to recover data, but a third were still unable to get their information back.
    Story image
    Artificial Intelligence
    AI-based email security platform Abnormal Security valued at $4B
    "A new breed of cybersecurity solutions that leverage AI is required to change the game and stop the rising threat of sophisticated and targeted email attacks."
    Story image
    Cybersecurity
    Companies rushing to secure print infrastructure
    As the pandemic prioritised communication channels and the shift to remote work, IT departments fell behind in updating the security of print and IT infrastructure.
    Story image
    Cybersecurity
    New report reveals evolving techniques targeting cloud-native environments
    Companies are adopting cloud-native technologies faster than ever before. Unfortunately, with new technology comes new threats and challenges.
    Story image
    Malware
    Sharp increase in phishing as cybercriminals leverage SEO to lure victims
    "Malware lurking everywhere, from cloud apps to search engines, leaving organisations at greater risk than ever before."
    Story image
    BeyondTrust
    BeyondTrust integrates Password Safe solution with SailPoint
    BeyondTrust has announced the integration of BeyondTrust Password Safe with SailPoint identity security offerings.
    Story image
    Tech job moves
    Tech job moves - Datacom, Micro Focus, SnapLogic and VMware
    We round up all job appointments from May 6-12, 2022, in one place to keep you updated with the latest from across the tech industries.
    Story image
    Artificial Intelligence
    Updates from Google Workspace set to ease hybrid working troubles
    Google Workspace has announced a variety of new features which will utilise Google AI capabilities to help make hybrid working situations more efficient and effective.
    Story image
    Ransomware
    Cybersecurity starts with education
    In 2021, 80% of Australian organisations responding to the Sophos State of Ransomware study reported being hit by ransomware. 
    Story image
    Cybersecurity
    The 'A-B-C' of effective application security
    Software applications have been a key tool for businesses for decades, but the way they are designed and operated has changed during the past few years.
    Story image
    Cybersecurity
    Hard numbers: Why ambiguity in cybersecurity no longer adds up
    As cybersecurity costs and risks continue to escalate, CEOs continue to struggle with what their investment in cyber protection buys. Getting rid of ambiguity becomes necessary.
    Story image
    APAC
    Odaseva expands in APAC and UK with more security features
    Odaseva, a data platform for Salesforce, is establishing new headquarters in London as well as a new data center in India.
    Story image
    Digital Transformation
    Physical security systems guide the hybrid workplace to new heights
    Organisations are reviewing how data gathered from their physical security systems can optimise, protect and enhance their business operations in unique ways.
    Story image
    Blue Prism
    Blue Prism Desktop uses IA to defend against vulnerabilities
    SS&C Blue Prism Desktop aims to help protect businesses against vulnerabilities, using a combination of security measures and intelligent automation tech.
    Story image
    Cybersecurity
    Video: 10 Minute IT Jams - An update from IronNet
    Michael Ehrlich joins us today to discuss the history of IronNet and the crucial role the company plays in the cyber defence space.
    Story image
    Remote Working
    How zero trust and SD-WANs can support productive remote working
    The way people connect with applications and data has changed, users are remotely accessing resources that could be stored anywhere from a corporate data center to the cloud.
    Story image
    Training
    Fortinet training edges toward closing cybersecurity gap
    The Fortinet Training Institute has made significant progress in closing the cybersecurity skills gap, on track to train one million people by 2026.
    Story image
    Forensics
    Exterro adds advanced capabilities to digital forensic tool
    The launch is in-line with Exterro’s investment in the FTK product line, and underscores the company's commitment to the digital forensics.
    Story image
    Cybersecurity
    ThoughtLab reveals 10 best practices for cybersecurity in 2022
    The benchmarking study reveals best practices that can reduce the probability of a material breach and the time it takes to find and respond to those that happen.
    Story image
    Cybersecurity
    CyberArk launches $30M investment fund to advance security
    CyberArk has announced the launch of CyberArk Ventures, a $30 million global investment fund dedicated to advancing the next generation of security disruptors.
    Story image
    Cybersecurity
    HackerOne launches Attack Resistance Management solution
    HackerOne has launched Attack Resistance Management - a new category of security solution that targets the root causes of the attack resistance gap. 
    Story image
    Ransomware
    Zerto unveils updates to ransomware recovery capabilities
    "Organisations face increased risks from the volume and sophistication of ransomware attacks prevalent today."
    Story image
    Appian
    Appian awarded billions in damages against Pegasystems Inc.
    Appian has been awarded USD$2.036 billion in damages against Pegasystems Inc as the result of a jury verdict in the Circuit Court for Fairfax County, Virginia.
    Story image
    Sift
    Sift shares crucial advice for preventing serious ATO breaches
    Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
    Story image
    Tech job moves
    Tech job moves - Cisco, Hitachi Vantara, Tricentis & Zscaler
    We round up all job appointments from April 28 - May 5, 2022, in one place to keep you updated with the latest from across the tech industries.
    Story image
    Hyperscale
    SpaceDC partners with Aofei for data center sales in Asia
    SpaceDC has partnered with Aofei Data International to sell Aofei's data centers, CDN and SDN in China.
    Story image
    SaaS
    Absolute Software expands Secure Access product offering
    Absolute Software is enhancing its Secure Access product portfolio, enabling minimised risk exposure and optimised user experiences in the hybrid working environment.
    Story image
    Ivanti
    Ivanti and Lookout bring zero trust security to hybrid work
    Ivanti and Lookout have joined forces to help organisations accelerate cloud adoption and mature their zero trust security posture in the everywhere workplace.
    SonicWall
    Find out how you and your business can prevent being caught out by everything from ransomware to cryptojacking.
    Link image
    Story image
    Application Security
    What are the DDoS attack trend predictions for 2022?
    Mitigation and recovery are vital to ensuring brand reputation remains solid in the face of a Distributed Denial of Service (DDoS) attack and that business growth and innovation can continue.
    Story image
    Cybersecurity
    A10 Networks finds over 15 million DDoS weapons in 2021
    A10 Networks notes that in the 2H 2021 reporting period, its security research team tracked more than 15.4 million Distributed Denial-of-Service (DDoS) weapons.
    Story image
    Secure access service edge / SASE
    Versa Networks recognised as SASE leader in Govie Awards
    Versa Networks has announced its SASE offering has been recognised in The Govies Government Security Awards competition by Security Today magazine.
    Story image
    VPN
    Palo Alto Networks says ZTNA 1.0 not secure enough
    Palo Alto Networks is urging the industry to move to Zero Trust Network Access 2.0 because previous versions have major gaps in security protection.
    Story image
    Phishing
    KnowBe4 celebrates reaching 50,000 customers worldwide
    KnowBe4 has reached the milestone of 50,000 customers, adding nearly 2,500 in the first quarter of 2022 alone.
    Story image
    Phishing
    Developments in phishing and how to protect your business
    Phishing, the practice of sending malicious emails to encourage users to perform actions that benefit an attacker, is a key security concern for modern businesses due to its prevalence and impact.
    Story image
    Microsoft
    Microsoft unveils three new security managed services
    Security Experts includes three new managed services, Defender Experts for Hunting, Defender Experts for XDR, Security Services for Enterprise.
    Story image
    Firewall
    Sophos named Gartner Peer Insights Customers Choice for network firewalls
    The company earned the highest overall customer rating among vendors with at least 150 verified customer reviews.
    Story image
    Microsoft
    Apple, Google and Microsoft expands plans to get rid of passwords
    FIDO Alliance says the world is closer to not relying on passwords after Apple, Google and Microsoft expands their support for a passwordless sign-in standard.
    Story image
    Workato
    Workato unveils enhancements to enterprise automation platform
    "The extra layer of protection with EKM, zero-logging, and hourly key rotation gives customers a lot more visibility and control over more sensitive data."
    Story image
    Artificial Intelligence
    ForgeRock releases Autonomous Access solution powered by AI
    ForgeRock has officially introduced ForgeRock Autonomous Access, a new solution that uses AI to prevent identity-based cyber attacks and fraud.
    Story image
    Cybersecurity
    Managed service providers: effective scoping to avoid costly vendor pitfalls
    Managed security services are outsourced services focusing on the security and resilience of business networks.
    Story image
    Phishing
    Google reveals new safety and security measures for users
    Google's new measures include automatic two step verification, virtual cards and making it easier to remove contact information on Google Search results.