Tech Security: Here's How to Rein in Shadow IT

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Tech Security: Here's How to Rein in Shadow IT-2 Next

Put Shadow IT on Your Agenda

It's difficult to add another item to your agenda when you're drowning in everyday tasks, but it takes strategic planning to make an impact on shadow IT. While the term is certainly a popular buzzword in technology circles, many non-IT workers are probably unaware of it, and may even be unaware that they are participating in it. Put shadow IT on your agenda, and actively communicate it at all levels of the company.

Shadow IT has been featured in the headlines for years, often as a massive headache for enterprise IT. Line of business managers swiping credit cards to pay for services outside IT's watchful eye created a scare in the industry, as did BYOD and the idea that employees would share corporate data through consumer file-sharing applications. At the same time, the use of consumer-grade collaboration and productivity applications in the SMB market has been seen as a benefit, as small companies that cannot afford expensive, enterprise software have gained access to cheap, effective tools.

But the sophistication of SMB IT has grown in recent years, and cybersecurity has become an issue that no organization can ignore. The time has come for SMBs to take shadow IT seriously and address the issue in a way that is inclusive to employees and meets the needs of the business. Here are seven tips from Paessler on how best to address shadow IT.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.