8 steps to regaining control over shadow IT

Image by Pexels
“Shadow IT” refers to the too-common practice whereby managers select and deploy cloud services without the consent or even the knowledge of the IT department. These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to ensure they follow necessary guidelines, introducing security, compliance, and brand risk throughout the enterprise. Gartner predicts that by 2020, one-third of security breaches will come in through shadow IT services.
To read this article in full or to leave a comment, please click here
Read more: 8 steps to regaining control over shadow IT
Story added 21. February 2017, content source with full text you can find at link above.
More antivirus and malware news?
- Outdated iOS Devices a Threat to Enterprise Networks
- Microsoft Windows iSCSI Packets Handling CVE-2014-0255 Remote Denial of Service Vulnerability
- Raspberry Pi blasted into space, sends back video of Earth
- Part of EU’s New €1.3 Billion Investment Going to Cybersecurity
- Sites Update
- Oracle Database Server Multiple Local Security Vulnerabilities
- Weev Gets 41 Months
- How Do I Protect Myself When Using Wi-Fi?
- FBI Publishes IOCs for LockBit 2.0 Ransomware Attacks
- Don’t Let the Grinch Hack Your Christmas!