How to prevent shadow IT

Image by Mette1977
What do complex IT policies, outdated software and lack of IT-supported services have in common? They all contribute to shadow IT, which occurs when employees circumvent procedures to use unapproved services and software. The last thing employees want to do when working on a project is check in with the IT department, so how can IT provide employees with necessary resources so shadow IT is no longer an issue? These InfoSec professionals share their suggestions for preventing shadow IT before it becomes the new normal.
To read this article in full or to leave a comment, please click here
Read more: How to prevent shadow IT
Story added 16. February 2016, content source with full text you can find at link above.
More antivirus and malware news?
- Security Vulnerability in MySQL
- CryptoRom “pig butchering” scam sites seized, suspects arrested in US
- iPadOS Isn’t Just a Name. It’s a New Direction for Apple
- Why Hiring the ‘Best’ People Produces the Least Creative Results
- Worried about the Tesco Bank attack? Here’s our advice
- Palo Alto Networks Acquires Incident Response Firm Secdo
- Electrical outages at University Park
- What is Spyware?
- Google to Purge Billions of Files Containing Personal Data in Settlement of Chrome Privacy Case
- Sextortion – what’s new, and what to do [VIDEO]