Shadow IT is undermining your security
Source: CSO Online - Posted by Dave Wreski   
Hacks/Cracks Once upon a time, not so long ago, the IT admin chose exactly what hardware and software would be used by employees. Recent trends like the consumerization of IT and BYOD (bring your own device) have shifted the balance of power, but IT still has to maintain some degree of control over the applications used and where sensitive data is stored. Many users just download apps or start using unsanctioned services, though, and introduce unnceccesary security risks through "shadow IT."

Read this full article at CSO Online

Only registered users can write comments.
Please login or register.

Powered by AkoComment!