MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Keep Your Company Out Of The BSA’s Crosshairs

How To Keep Your Company Out Of The BSA’s Crosshairs

Let’s say that you have an employee who wants to do some good for your business and save your IT some cash on a piece of business software. They find a “free” version of it on the Internet, thinking they have found you a bargain deal. Little do you know that there is an agency out there that’s specifically looking for businesses like yours that don’t keep track of their software licensing, just to make a quick buck off of copyright infringement.

This organization--the Software Alliance (BSA)--was founded by Microsoft back in 1988 in an attempt to preserve intellectual property of member companies. Its initial goal was to put a halt to copyright infringement, especially in more recent years as pirating software has grown more popular. Only recently has the BSA started using some rather underhanded tactics to find unlicensed software on business systems.

One of these tactics tries to entice employees (or former employees), to report instances of software licensing fraud. In other words, they try to get your employees to report any suspicious software handling by promising complete and total anonymity and a cash reward. It’s a tempting offer for employees who might feel downtrodden about their work, and a report from one of these workers could be condemning for your company. The BSA runs ads across social media looking for whistleblowers - it’s not like a former employee needs to look very hard to find them.

But what if you don’t know that you’re using unlicensed software? Surely that makes a difference, right? Well… no. Being unaware won’t help your case, and there’s no excuse for using unlicensed software. Therefore, you need to ask yourself whether you’re willing to risk a situation like this potentially costing your business.

One of the best ways you can keep your business safe from the BSA is by restricting user permissions on your company devices. By this, we mean allowing only your IT department to install applications on your company’s computers. This keeps your employees from finding questionable software licenses on the Internet and implementing them without IT approval, effectively eliminating a big risk factor for your organization.

The need for software licensing documentation cannot be expressed enough. You need to be ready for an audit at any given time, as they can (like many business matters) be unpredictable. Therefore, what we recommend is that you reach out to an unbiased third-party provider for a comprehensive network audit to look for unlicensed software. The goal is to find any instances of unlicensed software so that, in the event of an unexpected audit, you aren’t caught red-handed--even if it’s not your fault.

MERIT Solutions can provide your business with the quality network audit needed to snuff out any instances of unlicensed software on your infrastructure. To learn more, reach out to us at (757) 420-5150.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Internet Productivity Hosted Solutions Business Management Backup google Managed IT Services Computer Mobile Devices Microsoft Outsourced IT Disaster Recovery Business Continuity communications Business VoIP Windows 10 IT Support User Tips Hardware Innovation Cybersecurity Email IT Services Data Backup Cybercrime Efficiency Ransomware Mobility Data Recovery Saving Money Tech Term Mobile Device Management Windows Managed IT Small Business Apps Server Smartphone Law Enforcement Operating System Internet of Things Productivity browser Data BDR Office 365 Save Money Telephone Systems Android Virtualization Money Phishing Smartphones Passwords Hosted Solution Quick Tips Data Security Cloud Computing Managed Service Provider Chrome Communication Information Technology VPN Recovery Microsoft Office Password Holiday BYOD Automation upgrade Wi-Fi Miscellaneous Social Application Computers App Social Media Best Practice Vulnerability Budget Two-factor Authentication Facebook Government Wireless Data Management Data Breach Network Risk Management Update Unsupported Software Gadgets Google Drive Hacking Avoiding Downtime Work/Life Balance Cost Management Collaboration Alert Health IT Support Firewall Office tips Antivirus Applications Private Cloud search History Current Events Remote Computing Audit Proactive IT Compliance Personal Information Spam The Internet of Things User Error Politics Managed IT Services Employer-Employee Relationship Cleaning USB Save Time Gmail Tech Support Identity Theft Workplace Tips Wireless Technology Artificial Intelligence Flexibility Shortcut Data Protection Social Engineering Telephony Streaming Media Vendor Management Router Redundancy SaaS Robot WiFi Commerce Samsung Mobile Security Going Green Content Filtering Devices End of Support Battery Cortana Bandwidth Patch Management Windows 10 HaaS eWaste Google Assistant Fraud Automobile Excel Value Humor Disaster Wireless Charging Data Storage Saving Time OneNote Office Computer Care Phone System Sports Project Management Legal IT solutions Data Loss Users Hacker Encryption Marketing Solid State Drive Internet Exlporer DDoS Google Docs Big Data iPhone Television Mobile Computing Management Education Blockchain Transportation Apple IT Management Windows 10s Text Messaging App store Wearable Technology Travel hp Nanotechnology Financial Technology How To Device Security Identities Storage Benefits WIndows Server 2008 domain Hard Disk Drive Credit Cards Tablets Unified Threat Management Root Cause Analysis Printing IoT Training remote Entertainment Identity Laptop Uninterrupted Power Supply FAQ NFL Upgrades Yahoo Augmented Reality Electronic Medical Records Spyware Touchscreen Point of Sale Language Lifestyle Business Intelligence Running Cable Outlook Company Culture Server 2008 HIPAA Data Privacy Touchpad Charger Word Consultant Ali Rowghani Safety Computer Forensics Reputation Black Market Advertising Trending Legislation Managed IT Service Smart Technology iOS Hard Drive Avoid Downtime Windows Ink PowerPoint Shadow IT Edge Document Management Virus Data storage Comparison Regulation server installation dvd "cannot install required files" Computer Fan Experience Chromebook Evernote Chromecast Google Maps stock Wireless Internet Administration Ciminal Proactive Specifications Screen Mirroring Sync Dark Web Smart Tech Video Games Networking Software as a Service tweet Meetings Gamification Colocation Virtual Reality Emails Hard Drives Websites Sales Cast Scam Adobe calculator Music Connectivity Files Workers Administrator Lithium-ion battery Twitter Settings Memory MSP control Data Theft Retail Employer Employee Relationship Updates Licensing WannaCry Analytics Content Filter intranet Access WSJ Keyboard Students Relocation Instant Messaging HBO Computer Accessories Exchange Webinar Worker Commute Computing Conferencing Microsoft Word Distributed Denial of Service Mobile Mobile Device altivista Monitoring Managing Stress IT budget Microsoft Excel Remote Monitoring Unified Communications SBS IT solutions PDF Analysis Gifts Professional Services compaq Books Scalability Maintenance File Sharing Hiring/Firing Financial CrashOverride Emergency Thank You Worker Congratulations Cache Monitors

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...