4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Keep Your Company Out Of The BSA’s Crosshairs

How To Keep Your Company Out Of The BSA’s Crosshairs

Let’s say that you have an employee who wants to do some good for your business and save your IT some cash on a piece of business software. They find a “free” version of it on the Internet, thinking they have found you a bargain deal. Little do you know that there is an agency out there that’s specifically looking for businesses like yours that don’t keep track of their software licensing, just to make a quick buck off of copyright infringement.

This organization--the Software Alliance (BSA)--was founded by Microsoft back in 1988 in an attempt to preserve intellectual property of member companies. Its initial goal was to put a halt to copyright infringement, especially in more recent years as pirating software has grown more popular. Only recently has the BSA started using some rather underhanded tactics to find unlicensed software on business systems.

One of these tactics tries to entice employees (or former employees), to report instances of software licensing fraud. In other words, they try to get your employees to report any suspicious software handling by promising complete and total anonymity and a cash reward. It’s a tempting offer for employees who might feel downtrodden about their work, and a report from one of these workers could be condemning for your company. The BSA runs ads across social media looking for whistleblowers - it’s not like a former employee needs to look very hard to find them.

But what if you don’t know that you’re using unlicensed software? Surely that makes a difference, right? Well… no. Being unaware won’t help your case, and there’s no excuse for using unlicensed software. Therefore, you need to ask yourself whether you’re willing to risk a situation like this potentially costing your business.

One of the best ways you can keep your business safe from the BSA is by restricting user permissions on your company devices. By this, we mean allowing only your IT department to install applications on your company’s computers. This keeps your employees from finding questionable software licenses on the Internet and implementing them without IT approval, effectively eliminating a big risk factor for your organization.

The need for software licensing documentation cannot be expressed enough. You need to be ready for an audit at any given time, as they can (like many business matters) be unpredictable. Therefore, what we recommend is that you reach out to an unbiased third-party provider for a comprehensive network audit to look for unlicensed software. The goal is to find any instances of unlicensed software so that, in the event of an unexpected audit, you aren’t caught red-handed--even if it’s not your fault.

4IT can provide your business with the quality network audit needed to snuff out any instances of unlicensed software on your infrastructure. To learn more, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Hardware Business Continuity Workplace Tips VoIP Computer User Tips Saving Money Windows 10 Miscellaneous Virtualization Upgrade Mobile Device Management Mobile Devices Data Network Security Server Mobile Computing Email Alert Communication Network Save Money Microsoft Office Smartphone Small Business communications Quick Tips Social Media Information Technology Smartphones BYOD Going Green Mobile Office Office Apps Health Android Managed IT Services Browser Outsourced IT Gadgets Operating System Chrome Application Ransomware Productivity Tablet Managed IT WiFi Mobility Holiday Firewall Avoiding Downtime Disaster Risk Management Spam BDR Cybersecurity Search Best Practice Data Management Passwords The Internet of Things Cybercrime Remote Computing Unified Threat Management Telephone Systems IT Solutions Budget Hard Drives Saving Time Automation Remote Monitoring History Hacking Apple VPN Vendor Management Facebook Employer-Employee Relationship Content Filtering Data Backup Recovery Phone System iPhone Proactive IT Customer Relationship Management User Error Office Tips Law Enforcement Collaboration Wireless Technology Phishing Data Recovery Password Marketing Hosted Solution Money Computers Big Data Humor Administration Analytics Encryption Router Wearable Technology Gmail Government Maintenance PowerPoint Virus Work/Life Balance Lithium-ion battery Antivirus Shortcut Office 365 Social Vulnerability Current Events Bring Your Own Device Printer Telephony USB Google Drive Computer Repair Cloud Computing Outlook Save Time Data Security Data Protection App Cost Management SaaS Intranet Users Audit Bandwidth HaaS Printer Server Windows 8 Laptop Business Intelligence OneNote Politics Education Personal Information Trending Net Neutrality Social Engineering Point of Sale Wireless IT COnsultant Unsupported Software Tech Support Private Cloud Benefits Fax Server DDoS Computer Accessories Internet Exlporer Workplace Compliance Mouse Streaming Media Internet of Things Identity Theft Solid State Drive Uninterrupted Power Supply Two-factor Authentication Social Networking online currency Flexibility Sports Managing Stress Excel Samsung Wi-Fi Emergency Travel Artificial Intelligence IT Support Efficency Windows 10 Applications Update Customer Service Biometrics hacker Retail Virtual Reality Transportation Meetings Network Congestion Display Computer Care Battery Robot Help Desk Instant Messaging Emails Data Storage Augmented Reality Automobile HIPAA Paperless Office End of Support Entertainment Computing Document Management Data Breach File Sharing Advertising Legal Cast Touchpad Windows 10s Branding Mobile Device Managed Security systems Nanotechnology Distributed Denial of Service Scam Hard Disk Drive WIndows 7 Tablets Inbound Marketing hack Root Cause Analysis eWaste Storage Employer Employee Relationship Regulations HBO Twitter Operating Sysytem best practices Hard Drive Worker Commute NFL Value Cortana PDF CrashOverride Surge Protector Cameras Scalability IT Management Television Files data breach Uograde User Images 3D Printing Word Safety Legislation Text Messaging Settings Science Virtual Desktop Presentation How To WIndows Server 2008 Chromecast risk management Bluetooth Upgrades Best Available Windows Ink ISP IT Technicians Training Patch Management Administrator Colocation SharePoint Consultant Google Maps Programming The Blindside Of Blogging Commerce Company Culture Wiring Black Market Regulation Access Software as a Service Teamwork Information Touchscreen IT Security Busines Continuity Website Networking Debate Cleaning Near Field Communication Sync Data Loss iOS Experience OneDrive Keyboard Avoid Downtime Managed IT Service Managed IT Services Human Resources IT consulting Amazon Adobe Google Docs Co-managed IT Computer Fan Running Cable Music Hiring/Firing Reliable Computing Licensing Data storage Microsoft Excel Dark Web Lifestyle Nokia Books Bloatware Smart Technology Ebay Video Games Screen Mirroring IT solutions Mobile Professional Services Tutorial Taxes IT service Supercomputer Electronic Medical Records Microblogging Youtube Domains IT Budget Sales Reputation Comparison Managed Service Provder Gift Giving Webinar Specifications Buisness Shadow IT Relocation Webinar