Apr 292014

Shadow IT occurs when systems are bought, built, or implemented without the approval of IT at an organization. This problem has grown over the years, and is an especially important security concern since many systems are being set up by people who don’t understand the full landscape of what they are doing. This may lead to many security holes or misconfigured systems. Check out the article exploring this growing problem here.

 Posted by at 7:45 am on April 29, 2014