8 steps to regaining control over shadow IT
Image by Pexels
“Shadow IT” refers to the too-common practice whereby managers select and deploy cloud services without the consent or even the knowledge of the IT department. These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to ensure they follow necessary guidelines, introducing security, compliance, and brand risk throughout the enterprise. Gartner predicts that by 2020, one-third of security breaches will come in through shadow IT services.
To read this article in full or to leave a comment, please click here
Read more: 8 steps to regaining control over shadow IT
Story added 21. February 2017, content source with full text you can find at link above.
More antivirus and malware news?
- Flaw in Fortinet Login Page Allowed Attackers to Phish Credentials
- Russia, China ‘Cyber Threats’ Target Canada: Report
- Security firm offers more Flashback details, free tools
- Outage Hurts Twitter More Than It Hurts You
- Microsoft Windows Subsystem for Linux CVE-2019-0693 Local Privilege Escalation Vulnerability
- Weapons Systems Provide Valuable Lessons for ICS/OT Security
- US Indicts China’s iSoon ‘Hackers-for-Hire’ Operatives
- At Infosec Europe this week? Would you like a free gift?
- mSpy now selling phones pre-loaded with spyware
- Unable to unlock gunman’s iPhones, the FBI (once again) asks for Apple’s help