Some businesses are turning to pirated software to save money

Ransomware
(Image credit: Shutterstock)

A sizeable chunk of small to medium-sized businesses are ready to use pirated versions of business software to decrease their IT spending, new research from Kaspersky has claimed.

The most popular types of software to pirate were project management, marketing and sales software, with 56% of respondents saying they were happy to consider pirating a piece of cybersecurity software.

In eight months, Kaspersky says found that 9,685 of its users encountered malicious malware and unwanted software programs masquerading as popular SME software products.

What type of software is being pirated?

During the course of the research, Kaspersky claims it found 4,525 unique malicious or potentially unwanted files which were spread via unofficially distributed (including pirated) SMB-related software.

But it noted that among small businesses with less than 50 employees, only 7% are were ready to take such a step.

Kaspersky highlighted that this type of activity can seriously affect corporate cyber safety, highlighting how hackers can actively distribute malicious files under the guise of commonly used software as a way to evade firewalls and compromise businesses. 

“Even though malicious actors rely on email as the primary infection vector, cracked software downloadable via torrents is yet another trick that criminals use to lure victims into installing the malware on their systems, which in a business environment can lead to more data being compromised or stolen," said David Emm, Principal Security Researcher at Kaspersky.

In the case of budget restrictions, Emm recommended that businesses should use "reputable, community-backed, free open source alternatives that are much less likely to contain malicious code”.

Aside from giving open-source products a whirl, Kaspersky also recommends issuing employees standard accounts without admin rights, to help prevent the spread of malware.

The firm also highlighted that if your gadget is slowing down, overheats and makes a lot of noise even when no one is using it, someone might have installed a crypto miner on the device which is overloading the processor and video.

  • Want to slash your cybersecurity spending without doing anything illegal? Check out our guide to the best antivirus software

Will McCurdy has been writing about technology for over five years. He has a wide range of specialities including cybersecurity, fintech, cryptocurrencies, blockchain, cloud computing, payments, artificial intelligence, retail technology, and venture capital investment. He has previously written for AltFi, FStech, Retail Systems, and National Technology News and is an experienced podcast and webinar host, as well as an avid long-form feature writer.

Read more
Classroom
Many schools still don’t have basic cybersecurity measures, research reveals
An American flag flying outside the US Capitol building against a blue sky
US military and defense contractors hit with Infostealer malware
Shape of Russia filled with Russian flag-colored internet codes on a black hacking background
Government employees are still using Kaspersky despite the ban
Cyber-security
Cyber security on a shoestring: maximizing your ROI
Representational image of a cybercriminal
Should ransomware payments be illegal?
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
Latest in Software & Services
woman listening to computer
AWS vs Azure: choosing the right platform to maximize your company's investment
Autonomous finance
Quickbooks vs Quicken: what are the main strengths and weaknesses for your business
Group of people meeting
Zoom vs Google Meet: which is the best video conferencing tool for your business?
Person at laptop
Windows 11 vs Windows 365: which is the best choice for businesses?
A man sitting at his desk in the evening and using a desktop computer
Office 2021 vs Office 2024: is it time to upgrade?
Microsoft 365 Business app logos
Office 2024 LTSC vs Microsoft 365 Business: what are the differences?
Latest in News
Super Mario Odyssey
ChatGPT is the ultimate gaming tool - here's 4 ways you can use AI to help with your next playthrough
Brad Pitt looks over his right shoulder with 'F1' written behind him
Apple Original Films will take you behind-the-scenes of a racing cockpit in this new thrilling F1 movie trailer
AI writer
Coding AI tells developer to write it himself
Reacher looking down at another character from the Prime Video TV series Reacher
Reacher season 3 becomes Prime Video’s biggest returning show thanks to Hollywood’s biggest heavyweight
Finger Presses Orange Button Domain Name Registration on Black Keyboard Background. Closeup View
I visited the world’s first registered .com domain – and you won’t believe what it’s offering today
Image showing detail of the Leica D-Lux 8
Still can't get a Fujifilm X100VI? This premium Leica compact costs less, and it's in stock