Velocity Technology Partners Blog

Velocity Technology Partners has been serving the Bogart area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Keep Your Company Out Of The BSA’s Crosshairs

How To Keep Your Company Out Of The BSA’s Crosshairs

Let’s say that you have an employee who wants to do some good for your business and save your IT some cash on a piece of business software. They find a “free” version of it on the Internet, thinking they have found you a bargain deal. Little do you know that there is an agency out there that’s specifically looking for businesses like yours that don’t keep track of their software licensing, just to make a quick buck off of copyright infringement.

This organization--the Software Alliance (BSA)--was founded by Microsoft back in 1988 in an attempt to preserve intellectual property of member companies. Its initial goal was to put a halt to copyright infringement, especially in more recent years as pirating software has grown more popular. Only recently has the BSA started using some rather underhanded tactics to find unlicensed software on business systems.

One of these tactics tries to entice employees (or former employees), to report instances of software licensing fraud. In other words, they try to get your employees to report any suspicious software handling by promising complete and total anonymity and a cash reward. It’s a tempting offer for employees who might feel downtrodden about their work, and a report from one of these workers could be condemning for your company. The BSA runs ads across social media looking for whistleblowers - it’s not like a former employee needs to look very hard to find them.

But what if you don’t know that you’re using unlicensed software? Surely that makes a difference, right? Well… no. Being unaware won’t help your case, and there’s no excuse for using unlicensed software. Therefore, you need to ask yourself whether you’re willing to risk a situation like this potentially costing your business.

One of the best ways you can keep your business safe from the BSA is by restricting user permissions on your company devices. By this, we mean allowing only your IT department to install applications on your company’s computers. This keeps your employees from finding questionable software licenses on the Internet and implementing them without IT approval, effectively eliminating a big risk factor for your organization.

The need for software licensing documentation cannot be expressed enough. You need to be ready for an audit at any given time, as they can (like many business matters) be unpredictable. Therefore, what we recommend is that you reach out to an unbiased third-party provider for a comprehensive network audit to look for unlicensed software. The goal is to find any instances of unlicensed software so that, in the event of an unexpected audit, you aren’t caught red-handed--even if it’s not your fault.

Velocity Technology Partners can provide your business with the quality network audit needed to snuff out any instances of unlicensed software on your infrastructure. To learn more, reach out to us at (800) - 983 - 5765.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 18 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

File Sharing Politics Thank You Managed IT Services Hosted Solution Workers Licensing Saving Money Audit Software Gadgets Cloud Computing Apple Disaster Recovery Security Computer Sync Hosted Solutions Sports Risk Management App Data Protection Holiday Tip of the Week Computers Commerce VoIp WannaCry Communications Credit Cards Two-factor Authentication Server Microsoft Word VPN Backup Collaboration Email Redundancy Privacy Personal Information FAQ Telephone Systems Hackers Retail Comparison Evernote WIndows Server 2008 Microsoft Office Apps Smartphones Encryption Managed Service Provider Smartphone User Tips Android Google Docs Google Maps Proactive IT Lifestyle Cybersecurity Google WiFi Browser Adobe Technology Word Excel Spam Screen Mirroring Specifications Wireless Charging IT Solutions Google Drive Cybercrime Microsoft Excel Mobility Mobile Devices Windows Ink Network Security Data Loss Unsupported Software Wi-Fi Work/Life Balance Office 365 Storage eWaste OneNote BYOD SaaS Phishing IT Services Maintenance Mobile Device Management Data Breach Cloud Productivity Microsoft Cortana Outlook Wireless Technology Data Storage Small Business Data Backup NFL The Internet of Things Business Continuity IT Management Data Security History Cast Identity Theft Alert Data Recovery Sales Patch Management Internet Virtualization Malware Vulnerability Best Practices Congratulations Gifts Windows 10 Managed IT Outsourced IT Travel Windows HBO iPhone Data Management Government Social Media Shortcut Marketing IT Support Legislation Best Practice Passwords Software as a Service User Error Emergency Tablets Charger Applications Business Management Law Enforcement Hardware Conferencing Money Artificial Intelligence IT support Networking Chrome Updates Content Filtering

Blog Archive