Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices.
Shadowy Cloud Storage Platforms
"Dropbox and other non-sanctioned Enterprise File Synch and Share (EFSS) and cloud storage platforms are one of the most prolific forms of shadow IT in the enterprise," says Vishal Gupta, CEO of Seclore. "These products are attractive to employees due to their ease of use, but lack the data security features necessary for protecting highly sensitive documents."
The problem, Gupta adds, is that once this information is shared, the organization loses the ability to control who can use the files, creating huge security gaps.