Once upon a time, not so long ago, the IT admin chose exactly what hardware and software would be used by employees. Recent trends like the consumerization of IT and BYOD (bring your own device) have shifted the balance of power, but IT still has to maintain some degree of control over the applications used and where sensitive data is stored.

Many users just download apps or start using unsanctioned services, though, and introduce unnceccesary security risks through "shadow IT."

The link for this article located at CSO Online is no longer available.