As long as computers have been a part of the workplace, Shadow IT has existed. But with the rise in mobility and cloud technology, it’s become a growing threat you cannot ignore. Shadow IT, in its simplest definition, is the use of any technology or service for work without the knowledge of IT. Personal devices that are not monitored by IT or governed by BYOD policies, the use of personal cloud services, unmonitored apps, and even emailing files around: all Shadow IT and all tied to the Insider Threat, to people inadvertently, unknowingly or maliciously putting data at risk.
As much as 45% of data is held on the endpoint, often unprotected by even the most basic security policies. And the threat of Shadow IT is growing. Employees who are keen to keep working with the best tools possible are often unaware of how their actions jeopardize the security of the company. In a new article on Security Today, I dive into this topic: Shadow IT: Balancing Efficiency with Security.
The proliferation of devices per user, the use of cloud devices, and the disregard for security policies—even by IT professionals themselves—has made the Insider Threat an organization’s greatest vulnerability. We know that bad behavior, human error and social engineering are often at the root of data breaches. With Shadow IT, these actions to occur either on or off the corporate network, with the same devastating consequences. However, while the threat is rooted in people, so is the solution.
In the article, I offer some of the following tips:
Read the full article for more details on these recommendations. Absolute can help you monitor and protect against malicious and negligent insiders, regardless of user, location or whether they’re on or off network. Learn more at Absolute.com