MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Keep Your Company Out Of The BSA’s Crosshairs

How To Keep Your Company Out Of The BSA’s Crosshairs

Let’s say that you have an employee who wants to do some good for your business and save your IT some cash on a piece of business software. They find a “free” version of it on the Internet, thinking they have found you a bargain deal. Little do you know that there is an agency out there that’s specifically looking for businesses like yours that don’t keep track of their software licensing, just to make a quick buck off of copyright infringement.

This organization--the Software Alliance (BSA)--was founded by Microsoft back in 1988 in an attempt to preserve intellectual property of member companies. Its initial goal was to put a halt to copyright infringement, especially in more recent years as pirating software has grown more popular. Only recently has the BSA started using some rather underhanded tactics to find unlicensed software on business systems.

One of these tactics tries to entice employees (or former employees), to report instances of software licensing fraud. In other words, they try to get your employees to report any suspicious software handling by promising complete and total anonymity and a cash reward. It’s a tempting offer for employees who might feel downtrodden about their work, and a report from one of these workers could be condemning for your company. The BSA runs ads across social media looking for whistleblowers - it’s not like a former employee needs to look very hard to find them.

But what if you don’t know that you’re using unlicensed software? Surely that makes a difference, right? Well… no. Being unaware won’t help your case, and there’s no excuse for using unlicensed software. Therefore, you need to ask yourself whether you’re willing to risk a situation like this potentially costing your business.

One of the best ways you can keep your business safe from the BSA is by restricting user permissions on your company devices. By this, we mean allowing only your IT department to install applications on your company’s computers. This keeps your employees from finding questionable software licenses on the Internet and implementing them without IT approval, effectively eliminating a big risk factor for your organization.

The need for software licensing documentation cannot be expressed enough. You need to be ready for an audit at any given time, as they can (like many business matters) be unpredictable. Therefore, what we recommend is that you reach out to an unbiased third-party provider for a comprehensive network audit to look for unlicensed software. The goal is to find any instances of unlicensed software so that, in the event of an unexpected audit, you aren’t caught red-handed--even if it’s not your fault.

MERIT Solutions can provide your business with the quality network audit needed to snuff out any instances of unlicensed software on your infrastructure. To learn more, reach out to us at (757) 420-5150.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup google Business Management Productivity Managed IT Services Disaster Recovery Computer Microsoft Outsourced IT Business Continuity Mobile Devices Business IT Support User Tips Windows 10 communications VoIP Productivity Email IT Services Hardware Innovation Cybercrime Managed IT Efficiency Data Backup Mobility Mobile Device Management Windows Apps Server Ransomware Smartphone Cybersecurity Small Business Save Money Saving Money browser Data Recovery Telephone Systems Android Virtualization Law Enforcement Operating System Internet of Things Hosted Solution Quick Tips Password Microsoft Office Holiday BYOD Data BDR Chrome Money Data Security Information Technology VPN Recovery Office 365 Passwords Gadgets Wireless Google Drive Hacking Phishing Avoiding Downtime Alert Risk Management Health Unsupported Software Social upgrade Miscellaneous Managed Service Provider Cloud Computing Computers App Communication Work/Life Balance Social Media Best Practice Facebook Budget Government Smartphones Data Management IT Support Politics Windows 10 Workplace Tips Two-factor Authentication Wireless Technology Vulnerability USB Save Time Automation Social Engineering Telephony Managed IT Services Identity Theft Data Breach Private Cloud Office tips Applications search History Flexibility Shortcut Proactive IT Wi-Fi The Internet of Things Firewall Application User Error Collaboration Current Events Audit Personal Information Hacker IT solutions Solid State Drive Internet Exlporer DDoS Saving Time Spam Cleaning Office iPhone Computer Care Phone System Excel Television Mobile Computing Data Storage Streaming Media Apple Blockchain Transportation Legal Encryption OneNote Users WiFi Robot Artificial Intelligence Going Green Bandwidth End of Support Remote Computing Data Loss Marketing eWaste Cost Management Google Docs SaaS Disaster Humor Samsung Antivirus Data Protection Content Filtering Battery Employer-Employee Relationship Redundancy HaaS Gmail Compliance Sports Commerce Network Project Management Update Tech Support Cortana Automobile Twitter MSP Value FAQ Administrator Patch Management Lithium-ion battery Avoid Downtime Shadow IT Augmented Reality control NFL Lifestyle Document Management Business Intelligence Touchscreen WSJ Relocation intranet Charger Access Experience Outlook Exchange Word Legislation Managed IT Service Distributed Denial of Service altivista IT budget Wireless Charging Video Games iOS Virtual Reality PDF SBS Windows Ink Maintenance Scam Comparison compaq Evernote Music Regulation Computer Fan Wearable Technology Text Messaging Google Maps hp Device Security Employer Employee Relationship Specifications Screen Mirroring Identities Networking Analytics Sync Dark Web Software as a Service Instant Messaging Meetings domain Keyboard Devices Computer Accessories Sales Worker Commute Cast Emails Mobile Device Workers Big Data Adobe Uninterrupted Power Supply Managing Stress Settings remote Laptop Yahoo Spyware Retail WannaCry Updates Books Licensing Scalability Education Running Cable Server 2008 Touchpad Hiring/Firing Ali Rowghani Reputation Fraud Vendor Management Conferencing HBO Router Webinar Trending Advertising Microsoft Word Mobile How To Microsoft Excel Benefits Edge Gifts IT solutions Unified Threat Management Data storage Professional Services File Sharing server installation dvd "cannot install required files" stock Administration Ciminal Training Chromecast Entertainment IT Management Windows 10s Nanotechnology Upgrades Electronic Medical Records Travel Storage Point of Sale tweet Colocation Company Culture Credit Cards HIPAA WIndows Server 2008 Hard Disk Drive Black Market Root Cause Analysis Hard Drives Consultant Tablets Smart Technology Files calculator Emergency CrashOverride Worker Cache Monitors Remote Monitoring Thank You Congratulations Safety

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...