4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Keep Your Company Out Of The BSA’s Crosshairs

How To Keep Your Company Out Of The BSA’s Crosshairs

Let’s say that you have an employee who wants to do some good for your business and save your IT some cash on a piece of business software. They find a “free” version of it on the Internet, thinking they have found you a bargain deal. Little do you know that there is an agency out there that’s specifically looking for businesses like yours that don’t keep track of their software licensing, just to make a quick buck off of copyright infringement.

This organization--the Software Alliance (BSA)--was founded by Microsoft back in 1988 in an attempt to preserve intellectual property of member companies. Its initial goal was to put a halt to copyright infringement, especially in more recent years as pirating software has grown more popular. Only recently has the BSA started using some rather underhanded tactics to find unlicensed software on business systems.

One of these tactics tries to entice employees (or former employees), to report instances of software licensing fraud. In other words, they try to get your employees to report any suspicious software handling by promising complete and total anonymity and a cash reward. It’s a tempting offer for employees who might feel downtrodden about their work, and a report from one of these workers could be condemning for your company. The BSA runs ads across social media looking for whistleblowers - it’s not like a former employee needs to look very hard to find them.

But what if you don’t know that you’re using unlicensed software? Surely that makes a difference, right? Well… no. Being unaware won’t help your case, and there’s no excuse for using unlicensed software. Therefore, you need to ask yourself whether you’re willing to risk a situation like this potentially costing your business.

One of the best ways you can keep your business safe from the BSA is by restricting user permissions on your company devices. By this, we mean allowing only your IT department to install applications on your company’s computers. This keeps your employees from finding questionable software licenses on the Internet and implementing them without IT approval, effectively eliminating a big risk factor for your organization.

The need for software licensing documentation cannot be expressed enough. You need to be ready for an audit at any given time, as they can (like many business matters) be unpredictable. Therefore, what we recommend is that you reach out to an unbiased third-party provider for a comprehensive network audit to look for unlicensed software. The goal is to find any instances of unlicensed software so that, in the event of an unexpected audit, you aren’t caught red-handed--even if it’s not your fault.

4IT can provide your business with the quality network audit needed to snuff out any instances of unlicensed software on your infrastructure. To learn more, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency IT Support Windows Disaster Recovery Innovation Hardware Business Continuity Workplace Tips VoIP Computer Mobile Devices User Tips Saving Money Miscellaneous Windows 10 Virtualization Upgrade Mobile Device Management Network Security Data Server Email Mobile Computing Alert communications Communication Network Save Money Microsoft Office Small Business Social Media Smartphone Quick Tips Information Technology Smartphones BYOD Going Green Mobile Office Apps Android Health Office Managed IT Services Outsourced IT Browser Gadgets Operating System Application Ransomware Chrome Cybersecurity Tablet Mobility WiFi Holiday Firewall The Internet of Things Avoiding Downtime Productivity Managed IT Disaster Spam Risk Management Best Practice BDR Data Management History Search Cybercrime Data Recovery Telephone Systems Passwords Data Backup Remote Computing Unified Threat Management IT Solutions Hacking Saving Time Remote Monitoring Apple VPN Employer-Employee Relationship Budget Vendor Management Facebook Marketing Automation Hard Drives Law Enforcement Proactive IT iPhone Customer Relationship Management User Error Phishing Password Collaboration Hosted Solution Computers Money Wireless Technology Recovery Phone System Big Data Content Filtering Office Tips Humor Analytics Encryption Administration Work/Life Balance Gmail Router Antivirus Wearable Technology Shortcut Government Social Maintenance Office 365 PowerPoint Virus Vulnerability Lithium-ion battery Telephony Current Events Bring Your Own Device Printer USB Audit Computer Repair HaaS Business Intelligence App Cost Management Intranet Politics Bandwidth Printer Server Users Personal Information Social Engineering Laptop Windows 8 OneNote Wireless Unsupported Software Private Cloud Trending Education Net Neutrality Google Drive Cloud Computing Save Time Tech Support Data Security Point of Sale Data Protection IT COnsultant SaaS Outlook Workplace Streaming Media Travel Samsung Wi-Fi Uninterrupted Power Supply Emergency IT Support Artificial Intelligence online currency Customer Service Update Applications Windows 10 Biometrics Social Networking Retail Virtual Reality hacker Meetings Transportation Efficency Instant Messaging Robot Emails Computer Care Battery HIPAA Redundancy Data Storage Entertainment Automobile Benefits End of Support DDoS Computer Accessories Display Internet Exlporer Network Congestion Compliance Mouse Augmented Reality Internet of Things Help Desk Identity Theft Two-factor Authentication Paperless Office Solid State Drive Managing Stress Excel Sports Flexibility Fax Server Cortana CrashOverride PDF User Science Files IT Management Scalability data breach Virtual Desktop Presentation Word Legislation Safety Settings Bluetooth Text Messaging Best Available Chromecast WIndows Server 2008 IT Technicians How To risk management Upgrades Windows Ink Twitter SharePoint Administrator Training Patch Management Colocation Consultant Google Maps Surge Protector Hard Drive Television The Blindside Of Commerce Teamwork Access 3D Printing Busines Continuity Company Culture Regulation Black Market Networking Near Field Communication Touchscreen Software as a Service Images IT Security Uograde Cleaning Sync Experience iOS Human Resources ISP IT consulting Data Loss Keyboard Managed IT Service Running Cable Avoid Downtime Adobe Managed IT Services Music Computer Fan Programming Reliable Computing Blogging Google Docs Hiring/Firing Bloatware Data storage Licensing Microsoft Excel Books Dark Web Website Wiring Smart Technology Screen Mirroring Video Games Information Document Management File Sharing Data Breach Branding Advertising OneDrive Debate Amazon Cast Distributed Denial of Service Legal Windows 10s Touchpad Co-managed IT Mobile Device systems Managed Security Nanotechnology WIndows 7 Storage Inbound Marketing Scam eWaste Hard Disk Drive Regulations Tablets Lifestyle hack Root Cause Analysis Ebay Nokia Computing Value Employer Employee Relationship HBO Worker Commute best practices Operating Sysytem Cameras NFL Electronic Medical Records Domains WannaCry IT Budget Tutorial Evernote Reputation Comparison Workers Buisness Specifications Updates Microblogging Youtube Conferencing Microsoft Word Shadow IT Gift Giving Relocation Sales Gifts Device Security Managed Service Provder Webinar Devices Webinar Credit Cards IT solutions Spyware Mobile FAQ Professional Services Charger Taxes IT service Wireless Charging Supercomputer