t cht lk
CONTAINING AND SECURING SHADOW IT AND TECHNICAL DEBT
Joseph Carson , Chief Security Scientist , Delinea , outlines some typical examples of Shadow IT that organizations should watch out for to maintain their own security .
To curb shadow IT effectively , you have to be aware of the environment in which it arises and why employees choose to use unmanaged apps and services . Here are some typical examples of shadow IT that organizations should watch out for .
With the rise in remote and hybrid work , the number of devices , apps and accounts that organizations must monitor has skyrocketed . With a massive increase in so-called shadow IT , comprehensive visibility has often been completely lost .
With staff driven to solve unexpected challenges at short notice , IT departments have also been accumulating technical debt . The consequences are an increased cyberattack surface and significant additional costs .
Despite the seemingly inevitable nature of these trends , they can be reversed and brought under control with the consistent implementation of transparency , automation and integration .
Shadow IT to watch out for
Shadow IT means any unmanaged IT systems used by employees beyond the radar of IT and security teams . These include cloud accounts , messaging apps and hardware such as laptops or smartphones used without the knowledge of those responsible for IT .
To curb shadow IT effectively , you have to be aware of the environment in which it arises and why employees
Shadow IT means any unmanaged IT systems used by employees beyond the radar of IT and security teams .
www . intelligentcio . com INTELLIGENTCIO APAC 75