8 steps to regaining control over shadow IT

Image by Pexels
“Shadow IT” refers to the too-common practice whereby managers select and deploy cloud services without the consent or even the knowledge of the IT department. These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to ensure they follow necessary guidelines, introducing security, compliance, and brand risk throughout the enterprise. Gartner predicts that by 2020, one-third of security breaches will come in through shadow IT services.
To read this article in full or to leave a comment, please click here
Read more: 8 steps to regaining control over shadow IT
Story added 21. February 2017, content source with full text you can find at link above.
More antivirus and malware news?
- Hidden details about the last Skype spread malware
- China reports rise in online attacks
- Developers need secure coding environments
- Hackers Scan All Tor Hidden Services To Find Weaknesses In The ‘Dark Web’
- Authentication Provider LoginID Raises $6 Million in Seed Funding
- Cross-Signed Certificates Crash Android
- 57% of college students think their Facebook postings aren’t vile at ALL!
- Browser feature can be abused to misrepresent download origin, researcher says
- Failures in Cybersecurity Fundamentals Still Primary Cause of Compromise: Report
- Apple lets rip with update spate: OS X, iOS, Safari, iTunes, QuickTime