4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Keep Your Company Out Of The BSA’s Crosshairs

How To Keep Your Company Out Of The BSA’s Crosshairs

Let’s say that you have an employee who wants to do some good for your business and save your IT some cash on a piece of business software. They find a “free” version of it on the Internet, thinking they have found you a bargain deal. Little do you know that there is an agency out there that’s specifically looking for businesses like yours that don’t keep track of their software licensing, just to make a quick buck off of copyright infringement.

This organization--the Software Alliance (BSA)--was founded by Microsoft back in 1988 in an attempt to preserve intellectual property of member companies. Its initial goal was to put a halt to copyright infringement, especially in more recent years as pirating software has grown more popular. Only recently has the BSA started using some rather underhanded tactics to find unlicensed software on business systems.

One of these tactics tries to entice employees (or former employees), to report instances of software licensing fraud. In other words, they try to get your employees to report any suspicious software handling by promising complete and total anonymity and a cash reward. It’s a tempting offer for employees who might feel downtrodden about their work, and a report from one of these workers could be condemning for your company. The BSA runs ads across social media looking for whistleblowers - it’s not like a former employee needs to look very hard to find them.

But what if you don’t know that you’re using unlicensed software? Surely that makes a difference, right? Well… no. Being unaware won’t help your case, and there’s no excuse for using unlicensed software. Therefore, you need to ask yourself whether you’re willing to risk a situation like this potentially costing your business.

One of the best ways you can keep your business safe from the BSA is by restricting user permissions on your company devices. By this, we mean allowing only your IT department to install applications on your company’s computers. This keeps your employees from finding questionable software licenses on the Internet and implementing them without IT approval, effectively eliminating a big risk factor for your organization.

The need for software licensing documentation cannot be expressed enough. You need to be ready for an audit at any given time, as they can (like many business matters) be unpredictable. Therefore, what we recommend is that you reach out to an unbiased third-party provider for a comprehensive network audit to look for unlicensed software. The goal is to find any instances of unlicensed software so that, in the event of an unexpected audit, you aren’t caught red-handed--even if it’s not your fault.

4IT can provide your business with the quality network audit needed to snuff out any instances of unlicensed software on your infrastructure. To learn more, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Business Google Efficiency Windows Innovation Disaster Recovery IT Support Hardware Business Continuity Workplace Tips VoIP Saving Money Computer Virtualization User Tips Upgrade Windows 10 Miscellaneous Mobile Devices Data Mobile Device Management Server Mobile Computing Email Network Security Save Money Microsoft Office Communication Network Alert Quick Tips communications Information Technology BYOD Going Green Mobile Office Social Media Smartphones Android Apps Office Small Business Smartphone Health Chrome Application Ransomware Browser Gadgets Outsourced IT Operating System Firewall Avoiding Downtime Disaster Tablet Productivity Managed IT Services Holiday Mobility The Internet of Things Cybercrime Remote Computing Risk Management Unified Threat Management Telephone Systems IT Solutions Spam WiFi Managed IT BDR Search Passwords Data Management Vendor Management Facebook Employer-Employee Relationship Budget Hard Drives History Remote Monitoring Saving Time Automation Cybersecurity Hacking Best Practice VPN Marketing Wireless Technology Phishing Password Hosted Solution Computers Big Data Customer Relationship Management Recovery Phone System Proactive IT Office Tips Law Enforcement Apple Collaboration Bring Your Own Device Social Current Events Money Humor Printer Telephony Administration USB Wearable Technology Content Filtering iPhone Analytics Maintenance PowerPoint Router Gmail Virus User Error Lithium-ion battery Antivirus Shortcut Office 365 OneNote Education Trending Net Neutrality Social Engineering Point of Sale IT COnsultant Data Backup Computer Repair Wireless Tech Support Unsupported Software Private Cloud Google Drive Cloud Computing Outlook Encryption Save Time App Government Users Cost Management Windows 8 Intranet Work/Life Balance HaaS Bandwidth Printer Server Data Recovery Laptop Business Intelligence Applications Update Customer Service Biometrics Network Congestion Data Storage Retail hacker Virtual Reality Personal Information Transportation Help Desk Meetings Display Battery Robot Computer Care Augmented Reality Instant Messaging Emails Automobile Paperless Office HIPAA End of Support Entertainment Benefits Fax Server DDoS Computer Accessories Internet Exlporer Workplace Mouse Compliance Social Networking Internet of Things Streaming Media Identity Theft Uninterrupted Power Supply Data Protection Solid State Drive online currency Two-factor Authentication IT Support Flexibility Managing Stress SaaS Excel Audit Vulnerability Samsung Wi-Fi Emergency Travel Efficency SharePoint Consultant Adobe Managed IT Services Colocation Programming Blogging The Blindside Of Computer Fan Debate Black Market Access Company Culture Teamwork Touchscreen Licensing Politics Website IT Security Dark Web Busines Continuity Near Field Communication Networking Cleaning Screen Mirroring Experience OneDrive Keyboard Avoid Downtime IT consulting Nokia Amazon Human Resources Cast Co-managed IT Running Cable Music Windows 10s Hiring/Firing Nanotechnology Reliable Computing Data storage Data Security Tablets Books Hard Disk Drive Ebay Bloatware Smart Technology Root Cause Analysis Video Games HBO Document Management Computing NFL Data Breach best practices Advertising CrashOverride Legal IT Management Touchpad Branding Mobile Device Distributed Denial of Service Word Managed Security data breach Hard Drive Scam Settings WIndows Server 2008 WIndows 7 eWaste risk management Inbound Marketing Uograde Sports Images Twitter Employer Employee Relationship Regulations Patch Management Worker Commute Operating Sysytem Surge Protector Windows 10 Value PDF Files Television Commerce Cameras Scalability Regulation User 3D Printing Science Safety Text Messaging Chromecast Virtual Desktop Presentation How To Sync Best Available Bluetooth Upgrades ISP Wiring IT Technicians iOS Artificial Intelligence Information Administrator Training Managed IT Service Buisness Webinar Shadow IT Mobile IT solutions Relocation Professional Services Lifestyle Tutorial Taxes Youtube Windows Ink Storage Microblogging IT service Supercomputer Electronic Medical Records Sales Managed Service Provder Domains IT Budget Webinar Reputation Gift Giving