UNDERSTANDING THE CHALLENGES OF EMPLOYING KMS PICO: MALWARE AND PROTECTION CONCERNS