Source |
Network World |
Identifiant |
319512 |
Date de publication |
2017-02-21 06:03:00 (vue: 2017-02-21 06:03:00) |
Titre |
8 steps to regaining control over shadow IT |
Texte |
A dangerous practice on the riseImage by Pexels“Shadow IT†refers to the too-common practice whereby managers select and deploy cloud services without the consent or even the knowledge of the IT department. These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to ensure they follow necessary guidelines, introducing security, compliance, and brand risk throughout the enterprise. Gartner predicts that by 2020, one-third of security breaches will come in through shadow IT services.To read this article in full or to leave a comment, please click here |
Envoyé |
Oui |
Condensat |
2020 act are article brand breaches but click cloud come comment common compliance consent control corporation dangerous department deploy ensure enterprise entirely even extensions follow full gartner groups guidelines here introducing it†knowledge lack leave managers necessary one over pexels“shadow please practice predicts process read refers regaining riseimage risk security select services shadow steered steps these third through throughout too whereby will without |
Tags |
|
Stories |
|
Notes |
|
Move |
|