Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices.
Plugins and Add-ons
Plugins and add-ons to applications approved by IT also create a great security risk, according to Darran Rolls, CISO of SailPoint. "Many people don't think about shadow IT in terms of plugins and add-ons to existing, approved applications. However, these applications expand approved SaaS applications into new territory, often with potentially significant security implications that haven't been evaluated by IT."