dcsimg

Tech Security: Here's How to Rein in Shadow IT

  • Tech Security: Here's How to Rein in Shadow IT-

    Stay in Constant Communication

    IT should keep in regular contact with employees in all departments and management. Don't wait until problems are springing up like weeds. Go to the departments regularly and ask them: What bothers you? What should be improved? Maintaining open dialogue and two-way communication helps to solve issues before they become major problems.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

Tech Security: Here's How to Rein in Shadow IT

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
  • Tech Security: Here's How to Rein in Shadow IT-8

    Stay in Constant Communication

    IT should keep in regular contact with employees in all departments and management. Don't wait until problems are springing up like weeds. Go to the departments regularly and ask them: What bothers you? What should be improved? Maintaining open dialogue and two-way communication helps to solve issues before they become major problems.

Shadow IT has been featured in the headlines for years, often as a massive headache for enterprise IT. Line of business managers swiping credit cards to pay for services outside IT's watchful eye created a scare in the industry, as did BYOD and the idea that employees would share corporate data through consumer file-sharing applications. At the same time, the use of consumer-grade collaboration and productivity applications in the SMB market has been seen as a benefit, as small companies that cannot afford expensive, enterprise software have gained access to cheap, effective tools.

But the sophistication of SMB IT has grown in recent years, and cybersecurity has become an issue that no organization can ignore. The time has come for SMBs to take shadow IT seriously and address the issue in a way that is inclusive to employees and meets the needs of the business. Here are seven tips from Paessler on how best to address shadow IT.