Is Shadow IT Really the Perilous Threat It’s Made Out to Be?

12.08.01 (3)

While most managers likely believe that their adoption of cloud and SaaS tools are instrumental to their success, IT heads seem to want to rein in that enthusiasm. Many are now alarmed by the pervasiveness of unsanctioned adoption of devices and software applications in organizations. This phenomenon, commonly referred to as “shadow IT,” has become the bane of many CIOs and IT administrators. After all, it’s difficult for administrators to secure what they don’t know exists.

Click here to view original webpage at www.infosecurity-magazine.com

Categories:

Your e-mail address will not be published.
Required fields are marked*