{"id":54177,"date":"2014-03-19T17:53:01","date_gmt":"2014-03-19T09:53:01","guid":{"rendered":"http:\/\/techielobang.com\/blog\/?p=54177"},"modified":"2014-03-19T17:53:01","modified_gmt":"2014-03-19T09:53:01","slug":"infographic-the-price-of-piracy","status":"publish","type":"post","link":"https:\/\/techielobang.com\/blog\/2014\/03\/19\/infographic-the-price-of-piracy\/","title":{"rendered":"Infographic: The Price of Piracy"},"content":{"rendered":"<p>Check out this Infographic on the topic of software piracy and counterfeit software. As part of its <a href=\"http:\/\/www.play-it-safe.net\/\" target=\"_blank\">Play It Safe<\/a> Day campaign, Microsoft has released a new joint study conducted by IDC and the National University of Singapore, which revealed that enterprises worldwide are expected to spend nearly US$500 billion (S$635 billion) in 2014 to deal with issues caused by malware deliberately loaded onto pirated software.<\/p>\n<p>Here is the full Media Release.<\/p>\n<div id=\"pressrelease-link-54177\" class=\"sh-link pressrelease-link sh-hide\"><a href=\"#\" onclick=\"showhide_toggle('pressrelease', 54177, 'Show Press Release (1,081 More Words)', 'Hide Press Release (1,081 Less Words)'); return false;\" aria-expanded=\"false\"><span id=\"pressrelease-toggle-54177\">Show Press Release (1,081 More Words)<\/span><\/a><\/div><div id=\"pressrelease-content-54177\" class=\"sh-content pressrelease-content sh-hide\" style=\"display: none;\"><\/p>\n<h2 style=\"text-align: center;\" align=\"center\">Malware on pirated software costs global enterprises more than US$500 billion or S$635 billion annually<\/h2>\n<p style=\"text-align: center;\" align=\"center\"><i>New study reports link between pirated software &amp; malware infections<\/i> <b><br \/>\n<\/b><\/p>\n<p><b>Singapore \u2014 March 19, 2014 \u2014<\/b> Enterprises worldwide are expected to spend nearly US$500 billion (S$635 billion) in 2014 to deal with issues caused by malware deliberately loaded onto pirated software \u2014 US$127 billion dealing with security issues and US$364 billion dealing with data breaches \u2014 according to a new joint study conducted by IDC and the National University of Singapore (NUS). Global consumers, on the other hand, are expected to spend US$25 billion and waste 1.2 billion hours this year because of security threats and costly computer fixes stemming from malware on pirated software.<\/p>\n<p>The study, titled \u201cThe Link Between Pirated Software and Cybersecurity Breaches,\u201d surveyed\u00a0 a total of 1,700 respondents consisting of consumers, IT workers, chief information officers, and government officials from 15 countries including Singapore and Brazil, China, France, Germany, India, Indonesia, Japan, Mexico, Poland, Russia, Thailand, Ukraine, the United Kingdom, as well as the United States. In addition, 203 computers acquired in 11 countries, namely Brazil, China, India, Indonesia, Mexico, Russia, South Korea, Thailand, Turkey, Ukraine, and the United States were also analyzed by NUS.<\/p>\n<p>It was revealed that 60 percent of consumers surveyed say their greatest fear from infected software is the loss of data, files or personal information, followed by unauthorized Internet transactions (51 percent) and hijacking of email, social networking and bank accounts (50 percent). This was consistent with the results amongst Singapore consumers surveyed who displayed an even greater concern in these areas. 65 percent of local consumers indicated loss of data, files or personal information as the biggest fear associated with infected software, followed by unauthorized Internet transactions (64 percent) and hijacking of email, social networking and bank accounts (61 percent).<\/p>\n<p>However, 43 percent of those same respondents (28 percent in Singapore) do not install security updates, leaving their computers open to attack by cybercriminals.<\/p>\n<p>Government officials expressed concern about the potential impact of cybersecurity threats to their nations. According to the survey, governments are most worried about the loss of business trade secrets or competitive information (59 percent), unauthorized access to confidential government information (55 percent), and the impact of cyberattacks on critical infrastructure (55 percent). In Singapore, government officials polled are most concerned about cybersecurity issues between trading partners (65 percent), the impact of cyberattacks on critical infrastructure (62 percent) as well as the loss of business trade secrets or competitive information (62 percent).<\/p>\n<p>It is estimated that governments could lose more than US$50 billion to deal with the costs associated with malware on pirated software.<\/p>\n<p>\u201cCybercriminals are profiting from any security lapse they can find, with financially devastating results for everyone,\u201d said Keshav Dhakad, Regional Director of Intellectual Property &amp; Digital Crimes Unit, Microsoft Asia. \u201cMotivated by money, they\u2019ve found new ways to break into computer networks so they can steal your identity, your passwords and your money, and unprotected, non-genuine software provides that easy way for cybercriminals. That\u2019s why at the Microsoft Digital Crimes Unit, we\u2019re focused on attacking and curbing such malicious acts by disrupting cybercriminal networks to keep our customers\u2019 personal and financial data safe and secure, while reducing the financial incentive for criminals. The Microsoft Cybercrime Center, a center of excellence for advancing the global fight against cybercrime, affirms our efforts to work closely with our industry partners, law enforcement and customers to create a safer internet and develop best practices for cybersecurity.\u201d<\/p>\n<p>The study was released today as part of Microsoft\u2019s \u201c<a href=\"http:\/\/www.play-it-safe.net\" target=\"_blank\">Play It Safe<\/a>\u201d campaign, a global initiative to create greater awareness of the connection between malware and piracy.<\/p>\n<p>Additional highlights from the survey include the following:<\/p>\n<ul>\n<li>Nearly two-thirds of enterprise losses (US$315 billion) will be at the hands of organized criminals.<\/li>\n<li>Nearly 20 percent of the pirated software in enterprises is installed by employees.<\/li>\n<li>Twenty-eight percent of global enterprise respondents and 27 percent of Singapore enterprise respondents reported security breaches causing network, computer or website outages occurring every few months or more; globally, 65 percent of those outages involved malware on end-user computers while in Singapore, the figure is higher at 71 percent.<\/li>\n<\/ul>\n<p>\u201cUsing pirated software is like walking through a field of landmines: You don\u2019t know when you\u2019ll come upon something nasty, but if you do it can be very destructive,\u201d said John Gantz, chief researcher at IDC. \u201cThe financial hazards are considerable, and the potential losses could leave once-profitable businesses on shaky ground. Buying legitimate software is less expensive in the long run \u2014 at least you know that you won\u2019t get anything \u2018extra\u2019 in the form of malware.\u201d<\/p>\n<p>The NUS forensics analysis of 203 new PCs loaded with pirated software found that a staggering 61 percent of the PCs were pre-infected with unsafe malware, including Trojans, worms, viruses, hacktools, rootkits and adware. These PCs, purchased through resellers and PC shops in 11 markets, included more than 100 discrete threats.<\/p>\n<p>\u201cIt is hugely concerning that brand new PCs are coming pre-infected with dangerous malware due to pirated software, making the users and companies readily vulnerable to security breaches,\u201d said Professor Biplab Sikdar, Department of Electrical &amp; Computer Engineering, National University of Singapore. \u201cThe university\u2019s forensic tests clearly indicate how cybercriminals are increasingly leveraging the unsecure supply chain of piracy to spread malware and compromise PC security in a serious way. We would only recommend usage of genuine software for online safety and cybersecurity.\u201d<\/p>\n<p>This year\u2019s research is an extension of IDC\u2019s 2013 <a href=\"http:\/\/www.microsoft.com\/en-us\/news\/download\/presskits\/antipiracy\/docs\/IDC030513.pdf\" target=\"_blank\">study<\/a>, \u201cThe Dangerous World of Counterfeit and Pirated Software,\u201d differentiated by the attitude of government officials as well as the analysis of new markets, making the economic connection to cybercrime.<\/p>\n<p>Whether an individual user, a small business, enterprise or even a government institution, all are encouraged to buy new computers from reputable sources to ensure they receive genuine software. Microsoft is committed to protecting its unsuspecting consumers from downloading or purchasing nongenuine software that exposes victims to malware that can lead to identity theft, loss of data and system failures. Customers are encouraged to visit <a href=\"http:\/\/www.microsoft.com\/security\" target=\"_blank\">http:\/\/www.microsoft.com\/<wbr \/>security<\/a> to learn more about malware and ensure their machines are not infected; if malware is present, the site offers tools to remove the infection.<\/p>\n<p>More information about the IDC study is available at the Microsoft Play It Safe website, <a href=\"http:\/\/www.play-it-safe.net\" target=\"_blank\">http:\/\/www.play-it-safe.net<\/a>, and the Digital Crimes Unit newsroom, <a href=\"http:\/\/www.microsoft.com\/en-us\/news\/presskits\/dcu\/default.aspx\" target=\"_blank\">http:\/\/www.microsoft.com\/en-<wbr \/>us\/news\/presskits\/dcu\/default.<wbr \/>aspx<\/a>. <i><\/i><\/p>\n<p align=\"center\">-End-<\/p>\n<p><b>About Microsoft<\/b><\/p>\n<p>Founded in 1975, Microsoft (Nasdaq \u201cMSFT\u201d) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.<\/p>\n<p>For news about Microsoft in Singapore, join the conversation on Twitter.\u00a0 Follow us at <a href=\"https:\/\/twitter.com\/Microsoft_SG\" target=\"_blank\">@Microsoft_SG<\/a><br \/>\n<\/div>\n<p>Here is Infographic<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"54178\" data-permalink=\"https:\/\/techielobang.com\/blog\/2014\/03\/19\/infographic-the-price-of-piracy\/microsoft-price-of-piracy\/\" data-orig-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2014\/03\/microsoft-price-of-piracy.jpg?fit=600%2C2423&amp;ssl=1\" data-orig-size=\"600,2423\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"microsoft-price-of-piracy\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2014\/03\/microsoft-price-of-piracy.jpg?fit=74%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2014\/03\/microsoft-price-of-piracy.jpg?fit=253%2C1024&amp;ssl=1\" class=\"aligncenter size-full wp-image-54178\" alt=\"microsoft-price-of-piracy\" src=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2014\/03\/microsoft-price-of-piracy.jpg?resize=600%2C2423\" width=\"600\" height=\"2423\" srcset=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2014\/03\/microsoft-price-of-piracy.jpg?w=600&amp;ssl=1 600w, https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2014\/03\/microsoft-price-of-piracy.jpg?resize=74%2C300&amp;ssl=1 74w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><br \/>\n[ad#img]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out this Infographic on the topic of software piracy and counterfeit software. As part of its Play It Safe Day campaign, Microsoft has released a new..<\/p>\n","protected":false},"author":1,"featured_media":54179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[1509,4310,61,14],"tags":[12554,4357,15947,116,3506,7335,2720,12555],"class_list":["post-54177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","category-infographic","category-local","category-techie","tag-counterfeit-software","tag-featured-2","tag-infographic","tag-microsoft","tag-nus","tag-piracy","tag-software","tag-software-piracy"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2014\/03\/microsoft-price-of-piracy-hd.jpg?fit=600%2C436&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8YKZ-e5P","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/54177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/comments?post=54177"}],"version-history":[{"count":3,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/54177\/revisions"}],"predecessor-version":[{"id":54182,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/54177\/revisions\/54182"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/media\/54179"}],"wp:attachment":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/media?parent=54177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/categories?post=54177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/tags?post=54177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}