The security impact of shadow IT

Gemma Moore, director at Cyberis, discusses the impact that shadow IT can have on security throughout the organisation Shadow IT is invisible to you. It might not be covered on your asset lists, because your asset management lists are incomplete. It might have no assigned owner, either because it doesn’t fit neatly into any business unit, or isn’t related to any current operational priorities but hasn’t been fully decommissioned yet. It might have been installed outside of usual processes, either without authorisation or because usual processes were overridden.

read more….