8 steps to regaining control over shadow IT

Image by Pexels
“Shadow IT” refers to the too-common practice whereby managers select and deploy cloud services without the consent or even the knowledge of the IT department. These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to ensure they follow necessary guidelines, introducing security, compliance, and brand risk throughout the enterprise. Gartner predicts that by 2020, one-third of security breaches will come in through shadow IT services.
To read this article in full or to leave a comment, please click here
Read more: 8 steps to regaining control over shadow IT
Story added 21. February 2017, content source with full text you can find at link above.
More antivirus and malware news?
- Microsoft Internet Explorer CVE-2015-2391 Remote Memory Corruption Vulnerability
- With hacking of US utilities, Russia could move from cyberespionage toward cyberwar
- Apache Struts Flaw Used to Deliver Cerber Ransomware
- Apple fixes FaceTime, USB-C, and Office 365 bugs in macOS Catalina
- Once again, Apple calls workers back to the office—once again, workers fight back
- Information Services Giant Wolters Kluwer Hit by Malware Attack
- With Vision Pro, Apple shows computing’s future. But who’s it for?
- Twitch Turns 10, and the Creator Economy Is in Its Debt
- Kicking Off MWC 2019 with Insights on Mobile Security and Growing Partnerships
- This Bomb-Simulating US Supercomputer Broke a World Record