There was a time, not too long ago, when most IT leaders believed shadow IT was a negligible element in their companies. They felt their IT organizations were so in control of what applications were purchased and who was granted access and that minimal adoption occurred without their knowledge. Those were the days when centralized IT was the norm, and the idea of business-led technology acquisition wasn’t thought to be realistic. “Not happening in my … More
The post The staying power of shadow IT, and how to combat risks related to it appeared first on Help Net Security.
This article has been indexed from Help Net Security
Read the original article: