Some companies turn to pirated software to save money

A significant number of small and medium-sized businesses are willing to use pirated versions of enterprise software to reduce their IT expenses, according to new research from Kaspersky.

The most popular types of software to hack were project management, marketing, and sales software, with 56% of respondents saying they would consider hacking cybersecurity software.

In eight months, according to Kaspersky, 9,685 of its users encountered malware and unwanted software programs masquerading as popular SMB software products.

What type of software is pirated?

During the research, Kaspersky claims to have found 4,525 unique malicious or potentially unwanted files that were distributed via unofficially distributed (including pirated) SMB-related software.

But he notes that among small businesses with less than 50 employees, only 7% are ready to take such a step.

Kaspersky pointed out that this type of activity can seriously affect businesses’ cybersecurity, highlighting how hackers can actively distribute malicious files under the guise of commonly used software in order to evade firewalls and compromise businesses.

“Even though malicious actors rely on email as their main infection vector, pirated software downloadable via torrents is another trick that criminals use to trick victims into installing the malware on their systems, which in a business environment, can lead to more data being compromised or compromised and stolen,” said David Emm, senior security researcher at Kaspersky.

In the event of budget restrictions, Emm recommended that companies use “free, reputable, community-supported open-source alternatives that are much less likely to contain malicious code.”

In addition to giving open source products a whirl, Kaspersky also recommends creating standard accounts for employees without administrator rights, to prevent the spread of malware.

The company also pointed out that if your gadget is slowing down, overheating and making a lot of noise even when no one is using it, someone may have installed a crypto-miner on the device that is overloading the processor and the video.

  • Want to cut your cybersecurity spending without doing anything illegal? Check out our guide to the best antivirus software

Comments are closed.