Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices.
Risky Behaviors Lead to Shadow IT
According to Martin Johnson, senior director, Cloud Security, Symantec, some of the most risky user behaviors when using any cloud application, but especially in shadow IT, include:
• Accidental oversharing of data
• Account compromise
• Data Exfiltration
• Data Destruction
• Malware Delivery