MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Keep Your Company Out Of The BSA’s Crosshairs

How To Keep Your Company Out Of The BSA’s Crosshairs

Let’s say that you have an employee who wants to do some good for your business and save your IT some cash on a piece of business software. They find a “free” version of it on the Internet, thinking they have found you a bargain deal. Little do you know that there is an agency out there that’s specifically looking for businesses like yours that don’t keep track of their software licensing, just to make a quick buck off of copyright infringement.

This organization--the Software Alliance (BSA)--was founded by Microsoft back in 1988 in an attempt to preserve intellectual property of member companies. Its initial goal was to put a halt to copyright infringement, especially in more recent years as pirating software has grown more popular. Only recently has the BSA started using some rather underhanded tactics to find unlicensed software on business systems.

One of these tactics tries to entice employees (or former employees), to report instances of software licensing fraud. In other words, they try to get your employees to report any suspicious software handling by promising complete and total anonymity and a cash reward. It’s a tempting offer for employees who might feel downtrodden about their work, and a report from one of these workers could be condemning for your company. The BSA runs ads across social media looking for whistleblowers - it’s not like a former employee needs to look very hard to find them.

But what if you don’t know that you’re using unlicensed software? Surely that makes a difference, right? Well… no. Being unaware won’t help your case, and there’s no excuse for using unlicensed software. Therefore, you need to ask yourself whether you’re willing to risk a situation like this potentially costing your business.

One of the best ways you can keep your business safe from the BSA is by restricting user permissions on your company devices. By this, we mean allowing only your IT department to install applications on your company’s computers. This keeps your employees from finding questionable software licenses on the Internet and implementing them without IT approval, effectively eliminating a big risk factor for your organization.

The need for software licensing documentation cannot be expressed enough. You need to be ready for an audit at any given time, as they can (like many business matters) be unpredictable. Therefore, what we recommend is that you reach out to an unbiased third-party provider for a comprehensive network audit to look for unlicensed software. The goal is to find any instances of unlicensed software so that, in the event of an unexpected audit, you aren’t caught red-handed--even if it’s not your fault.

MERIT Solutions can provide your business with the quality network audit needed to snuff out any instances of unlicensed software on your infrastructure. To learn more, reach out to us at (757) 420-5150.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 22 November 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Best Practices Business Computing Hackers Malware Software Hosted Solutions Backup Network Security google Internet Productivity Microsoft Disaster Recovery Computer Managed IT Services Business Continuity Business Windows 10 IT Support VoIP Innovation Outsourced IT IT Services User Tips Business Management Hardware Mobile Devices communications Managed IT Mobility Windows Mobile Device Management Productivity Ransomware Efficiency Email Smartphone Cybercrime Saving Money Telephone Systems Small Business Server Save Money Operating System Hosted Solution Quick Tips Android Virtualization Data Backup Apps Cybersecurity Law Enforcement Recovery Data Recovery VPN Passwords Microsoft Office browser BYOD Data Password BDR Money Information Technology Chrome Communication Budget Smartphones Office 365 Data Management Facebook Government Wireless Google Drive Hacking Avoiding Downtime Unsupported Software Health Miscellaneous Cloud Computing Managed Service Provider Computers Work/Life Balance upgrade Social Current Events Audit Personal Information Politics Phishing Managed IT Services USB Save Time Gadgets Automation Risk Management Workplace Tips Telephony Alert Holiday Data Security Office tips Applications Private Cloud Shortcut Proactive IT Social Media Best Practice Wi-Fi Firewall Application search App Humor Commerce Disaster Content Filtering Battery HaaS Employer-Employee Relationship Compliance Windows 10 User Error Network Sports Vulnerability Automobile Spam Hacker Solid State Drive Saving Time Internet Exlporer Gmail Cleaning Data Storage Wireless Technology Office Computer Care Phone System Update iPhone IT solutions Mobile Computing Users Encryption DDoS Transportation Identity Theft Robot Television Artificial Intelligence Flexibility Google Docs Social Engineering History End of Support Remote Computing Streaming Media Apple Cost Management Data Protection WiFi SaaS IT Support Internet of Things Going Green Bandwidth The Internet of Things Samsung Antivirus remote Storage Unified Threat Management WIndows Server 2008 Hard Disk Drive eWaste Yahoo Tablets Data storage Training Root Cause Analysis Entertainment Running Cable Server 2008 Cortana Upgrades Electronic Medical Records Patch Management Chromecast Point of Sale Ali Rowghani Administration NFL Company Culture Augmented Reality HIPAA Trending Touchscreen Black Market Lifestyle Consultant Business Intelligence Outlook Smart Technology Colocation Avoid Downtime Hard Drives Word Value Tech Support Shadow IT server installation dvd "cannot install required files" Legislation Two-factor Authentication Managed IT Service Files Excel Administrator iOS Lithium-ion battery Document Management stock Windows Ink Experience Comparison Regulation Access Computer Fan tweet Relocation Video Games Google Maps OneNote Data Breach Virtual Reality calculator Specifications Screen Mirroring Sync Scam Dark Web Twitter Legal PDF control Software as a Service Meetings Music Emails Sales Cast Adobe Employer Employee Relationship WSJ Text Messaging Exchange Data Loss Settings Analytics Keyboard Marketing Instant Messaging Distributed Denial of Service altivista Retail Licensing Computer Accessories Worker Commute SBS Mobile Device Big Data Webinar Managing Stress compaq HBO Mobile Scalability Wearable Technology Microsoft Excel Laptop Uninterrupted Power Supply Books Hiring/Firing IT solutions Education hp Professional Services Vendor Management Collaboration Router How To domain File Sharing Touchpad IT Management Benefits Windows 10s Reputation Advertising Travel Nanotechnology Safety Emergency Thank You CrashOverride Congratulations Worker WannaCry Cache Monitors Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...