1
Malware can be transmitted by the sites from which the pirated software is sourced through downloads. Malware may include dangerous adware, keystroke loggers, password and credential stealers, backdoors for hackers, and software that enables remote control of a PC. Help keep your company’s data safe with genuine Microsoft software. The most comprehensive security for your business Windows 10 is the most secure Windows that Microsoft has ever built, offering a multi-layered approach to protecting your company from modern-day security threats. Windows 10 security features provide peace of mind by encrypting data, preventing accidental information leaks by employees, and helping keep everything on lockdown if a device is lost or stolen. It’s a thoroughly comprehensive approach to helping protect your business information, customer data, employee identities and, ultimately, your reputation. How to avoid security threats from pirated software Acquire your PCs and software from trusted sources Beware of unlicensed or pirated software Install trusted security solutions Constantly monitor employee-installed software Pay attention to timely security updates Back up data files real-time Don’t pay ransomware Better safe than sorry Windows 10 security features Threat Resistance Microsoft Edge Device Guard Smart Screen Windows Defender Device Protection UEFI Secure Boot Windows Trusted Boot Breach Detection Investigation & Response Windows Defender Advanced Threat Protection Conditional Access Info Protection Windows Info Protection BitLocker + BitLocker To Go*** Identity Protection Windows Hello** Credential Guard Source: Cause and Costs of Security Threats From Pirated Software in Europe 2017. Issued by IDC, September 2017. *Software Management: Security Imperative, Business Opportunity. BSA Global Software Survey, June 2018. ***Requires TPM 1.2 or greater for TPM-based key protection. **Windows Hello with biometrics specialized hardware, a fingerprint reader, illuminated IR sensor, or other biometric sensor is required. Hardware-based protection of the Windows Hello credential/keys requires TPM 1.2 or greater. If no TPM exists or is configured, credentials/keys protection will be software-based. The business cost of malware associated with unlicensed software per infected computer* $10,000 + What’s the cause? Infection rate by pirated source 20% 36% 61% CD/DVD- based Software Trojans Web or P2P Downloaded Trojans/ Dangerous Adware Software Preinstalled on PCs from Suspect Sources Chance of infections from pirated software from all sources? That’s close to one in three unlicensed or pirated copies of software causing a malware infection! 28% Companies’ biggest fears from infectious pirated software Loss of data, files, or company information 59% Time and cost to disinfect 41% System outages or downtime 35% Loss of IP or proprietary information 28% Unauthorized access to data 27% Ransomware 23% Impact on organization reputation 17% (n=202) Three ways malware invades Software from suspect sources 1 Inattention to security updates 3 Reasons for inattention to security updates range from fear of being caught with pirated software, to lack of processes and controls. More than 66% of breaches take place after updates are available, but have not been applied. Employees bring own software to work 2 (in USD) 33% of organization PCs were obtained from suspect sources: auction site online supplier consultants PC assemblers increase in infected software on organization PCs. 19% Bringing software to work can result in a

Better safe than sorry $10,000 · 2019. 3. 3. · BSA Global Software Survey, June 2018. ***Requires TPM 1.2 or greater for TPM-based key protection. **Windows Hello with biometrics

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Better safe than sorry $10,000 · 2019. 3. 3. · BSA Global Software Survey, June 2018. ***Requires TPM 1.2 or greater for TPM-based key protection. **Windows Hello with biometrics

Malware can be transmitted by the sites from which the pirated software is sourced through downloads.

Malware may include dangerous adware, keystroke loggers, password and credential stealers, backdoors for hackers, and software that enables remote control of a PC.

Help keep your company’s data safe with genuine Microsoft software.

The most comprehensive security for your businessWindows 10 is the most secure Windows that Microsoft has ever built, offering a multi-layered approach to protecting your company from modern-day security threats. Windows 10 security features provide peace of mind by encrypting data, preventing accidental information leaks by employees, and helping keep everything on lockdown if a device is lost or stolen. It’s a thoroughly comprehensive approach to helping protect your business information, customer data, employee identities and, ultimately, your reputation.

How to avoid security threats from pirated software● Acquire your PCs and software from trusted sources● Beware of unlicensed or pirated software● Install trusted security solutions● Constantly monitor employee-installed software● Pay attention to timely security updates● Back up data files real-time ● Don’t pay ransomware

Better safe than sorry

Windows 10 security features

Threat ResistanceMicrosoft Edge

Device Guard

Smart Screen

Windows Defender

Device ProtectionUEFI Secure Boot

Windows Trusted Boot

Breach Detection Investigation & ResponseWindows Defender Advanced Threat Protection

Conditional Access

Info ProtectionWindows Info Protection

BitLocker + BitLocker To Go***

Identity ProtectionWindows Hello**

Credential Guard

Source: Cause and Costs of Security Threats From Pirated Software in Europe 2017. Issued by IDC, September 2017.*Software Management: Security Imperative, Business Opportunity. BSA Global Software Survey, June 2018.

***Requires TPM 1.2 or greater for TPM-based key protection.

**Windows Hello with biometrics specialized hardware, a fingerprint reader, illuminated IR sensor, or other biometric sensor is required. Hardware-based protection of the Windows Hello credential/keys requires TPM 1.2 or greater. If no TPM exists or is configured, credentials/keys protection will be software-based.

The business cost of malware associated with unlicensed software

per infected computer*

$10,000 + What’s the cause?

Infectionrate by pirated source

20%

36%61%

CD/DVD-basedSoftware Trojans

Web or P2P Downloaded Trojans/ Dangerous Adware

Software Preinstalled on PCs from Suspect SourcesChance of infections from pirated

software from all sources?

That’s close to one in three unlicensed or pirated copies of software causing a malware infection!

28%

Companies’ biggest fears from infectious pirated softwareLoss of data, files, or company information 59%

Time and cost to disinfect 41%

System outages or downtime 35%

Loss of IP or proprietary information 28%

Unauthorized access to data 27%

Ransomware 23%

Impact on organization reputation 17%

(n=202)

Three ways malware invadesSoftware from suspect sources1

Inattention to security updates3 Reasons for inattention to security updates range from fear of being caught with pirated software, to lack of processes and controls. More than 66% of breaches take place after updates are available, but have not been applied.

Employees bring own software to work2

(in USD)

33%of organization PCs were obtained from suspect sources:

● auction site● online supplier

● consultants● PC assemblers

increase in infected software on organization PCs.19%

Bringing software to work can result in a