Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices.
Don't Forget About Social Media Applications
"While not often mentioned in discussions around shadow IT, we shouldn't forget that hugely popular applications like Twitter, Facebook and Skype are risky applications to add to a user's device. These three applications alone are responsible for a significant amount of malware and information leakage, albeit almost unintentional," says Absolute's Global Security Strategist, Richard Henderson.