MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Keep Your Company Out Of The BSA’s Crosshairs

How To Keep Your Company Out Of The BSA’s Crosshairs

Let’s say that you have an employee who wants to do some good for your business and save your IT some cash on a piece of business software. They find a “free” version of it on the Internet, thinking they have found you a bargain deal. Little do you know that there is an agency out there that’s specifically looking for businesses like yours that don’t keep track of their software licensing, just to make a quick buck off of copyright infringement.

This organization--the Software Alliance (BSA)--was founded by Microsoft back in 1988 in an attempt to preserve intellectual property of member companies. Its initial goal was to put a halt to copyright infringement, especially in more recent years as pirating software has grown more popular. Only recently has the BSA started using some rather underhanded tactics to find unlicensed software on business systems.

One of these tactics tries to entice employees (or former employees), to report instances of software licensing fraud. In other words, they try to get your employees to report any suspicious software handling by promising complete and total anonymity and a cash reward. It’s a tempting offer for employees who might feel downtrodden about their work, and a report from one of these workers could be condemning for your company. The BSA runs ads across social media looking for whistleblowers - it’s not like a former employee needs to look very hard to find them.

But what if you don’t know that you’re using unlicensed software? Surely that makes a difference, right? Well… no. Being unaware won’t help your case, and there’s no excuse for using unlicensed software. Therefore, you need to ask yourself whether you’re willing to risk a situation like this potentially costing your business.

One of the best ways you can keep your business safe from the BSA is by restricting user permissions on your company devices. By this, we mean allowing only your IT department to install applications on your company’s computers. This keeps your employees from finding questionable software licenses on the Internet and implementing them without IT approval, effectively eliminating a big risk factor for your organization.

The need for software licensing documentation cannot be expressed enough. You need to be ready for an audit at any given time, as they can (like many business matters) be unpredictable. Therefore, what we recommend is that you reach out to an unbiased third-party provider for a comprehensive network audit to look for unlicensed software. The goal is to find any instances of unlicensed software so that, in the event of an unexpected audit, you aren’t caught red-handed--even if it’s not your fault.

MERIT Solutions can provide your business with the quality network audit needed to snuff out any instances of unlicensed software on your infrastructure. To learn more, reach out to us at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 22 September 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Business Computing Privacy Best Practices Hackers Malware Hosted Solutions Backup Software Internet Network Security Disaster Recovery Computer google Productivity Windows 10 Business Continuity Business Microsoft Managed IT Services IT Support VoIP Innovation IT Services Hardware Mobile Devices User Tips Outsourced IT communications Business Management Mobility Ransomware Efficiency Productivity Email Windows Managed IT Telephone Systems Server Save Money Cybercrime Saving Money Mobile Device Management Quick Tips Android Virtualization Apps Law Enforcement Smartphone Operating System Hosted Solution Microsoft Office Passwords browser BYOD Data Password Small Business BDR Information Technology Chrome Recovery Cybersecurity Hacking Avoiding Downtime Office 365 Health Miscellaneous Managed Service Provider Computers Money Wireless Social upgrade Unsupported Software Communication Budget VPN Facebook Government Wi-Fi Firewall Application Current Events Google Drive Gadgets Automation Telephony Workplace Tips Alert Office tips Applications Private Cloud Data Backup USB Save Time Proactive IT Social Media search Risk Management App Cloud Computing Smartphones Data Management Shortcut Work/Life Balance Cost Management Data Recovery Hacker Gmail Internet Exlporer Solid State Drive Wireless Technology Samsung Antivirus Update Spam Audit Battery Phishing IT solutions HaaS Compliance Data Storage Mobile Computing DDoS Managed IT Services Transportation Holiday Personal Information Automobile Robot Television Social Engineering History Remote Computing Streaming Media Saving Time End of Support Cleaning Office Best Practice WiFi Computer Care Phone System Internet of Things Going Green The Internet of Things Bandwidth Users Humor Disaster Identity Theft Employer-Employee Relationship IT Support Flexibility Network Tablets Scalability Root Cause Analysis Tech Support Books Hard Drives server installation dvd "cannot install required files" Hiring/Firing Education Files Windows 10 Lithium-ion battery stock Vendor Management Patch Management Router Administrator NFL How To Augmented Reality SaaS Benefits Business Intelligence Touchscreen Vulnerability tweet Relocation Outlook Access Word Unified Threat Management Content Filtering calculator Managed IT Service iOS Twitter Training Entertainment iPhone Excel PDF Upgrades control Electronic Medical Records Point of Sale Computer Fan WSJ Company Culture HIPAA Regulation Text Messaging Black Market OneNote Consultant Exchange altivista Smart Technology Screen Mirroring Distributed Denial of Service Data Breach Sync Avoid Downtime Dark Web Value Politics Shadow IT Meetings Two-factor Authentication SBS Emails compaq Document Management Cast Adobe Apple Experience Laptop Settings Uninterrupted Power Supply Wearable Technology Marketing hp Data Security Licensing Video Games Virtual Reality Touchpad domain Webinar Scam Reputation HBO Mobile Legal Music Advertising Encryption remote IT solutions Yahoo Employer Employee Relationship Data Protection eWaste Professional Services Data storage Collaboration Analytics Keyboard Instant Messaging Running Cable Server 2008 Windows 10s Ali Rowghani Computer Accessories Worker Commute Administration IT Management Artificial Intelligence Chromecast Travel Trending Nanotechnology Mobile Device Big Data Managing Stress Commerce Sports User Error Hard Disk Drive Colocation WIndows Server 2008 Thank You Congratulations Windows Ink CrashOverride Safety Emergency WannaCry Worker Cache Monitors Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...