Tech Security: Here's How to Rein in Shadow IT

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Next

Be Prepared to Engage

Line of business managers understand what it takes to accomplish their goals, and they employ the technology necessary to do so. But, they likely do not think about the impact that has on IT, whether it conforms to existing rules, or whether it creates a security risk. It's important to create a dialogue with coworkers, understand why they are going outside of traditional IT, and keep management informed on the topic so there is transparency throughout the company.

Shadow IT has been featured in the headlines for years, often as a massive headache for enterprise IT. Line of business managers swiping credit cards to pay for services outside IT's watchful eye created a scare in the industry, as did BYOD and the idea that employees would share corporate data through consumer file-sharing applications. At the same time, the use of consumer-grade collaboration and productivity applications in the SMB market has been seen as a benefit, as small companies that cannot afford expensive, enterprise software have gained access to cheap, effective tools.

But the sophistication of SMB IT has grown in recent years, and cybersecurity has become an issue that no organization can ignore. The time has come for SMBs to take shadow IT seriously and address the issue in a way that is inclusive to employees and meets the needs of the business. Here are seven tips from Paessler on how best to address shadow IT.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.