CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass

Thursday, October 10, 2024

Shadow IT

 Shadow IT

Shadow IT uses IT systems or software without the knowledge or approval of an organization's IT department. It can include using cloud services, hardware, or software.

Shadow IT can occur in several ways, including:

  • Using an unapproved tool to access, store, or share corporate data
  • Accessing an approved tool in an unauthorized manner
  • Sharing work files on a personal cloud storage account
  • Holding meetings through an unauthorized video conferencing platform
  • Creating an unofficial group chat without IT approval

Shadow IT can create serious security concerns and costs. Because the IT team is unaware of the use of these services, they are not protected by the organization's cybersecurity solutions or protocols. This can increase the risk of data breaches, noncompliance, and other liabilities.

Organizations can use a data protection solution to detect shadow IT. This solution provides visibility into all data movement and can automatically prioritize security risks based on the context of the file and user.

No comments:

Post a Comment