Shadow IT
Shadow
IT uses IT systems or software without the knowledge or approval of an
organization's IT department. It can include using cloud services,
hardware, or software.
Shadow
IT can occur in several ways, including:
- Using an unapproved tool to access, store, or share corporate data
- Accessing an approved tool in an unauthorized manner
- Sharing work files on a personal cloud storage account
- Holding meetings through an unauthorized video conferencing platform
- Creating an unofficial group chat without IT approval
Shadow
IT can create serious security concerns and costs. Because the IT team is
unaware of the use of these services, they are not protected by the organization's
cybersecurity solutions or protocols. This can increase the risk of data
breaches, noncompliance, and other liabilities.
Organizations can use a data protection solution to detect shadow IT. This solution provides visibility into all data movement and can automatically
prioritize security risks based on the context of the file and user.
No comments:
Post a Comment