5 Steps to Proactively Address Unauthorized IT in the Office | In the News

The term “shadow IT” has been around for several years — and for years, shadow IT itself has vexed IT departments. The practice of using applications and systems without the explicit approval of IT staff, or sometimes even without their knowledge, poses real challenges for businesses, particularly now that more employees are working from home.

Shadow IT is widespread in business. The Everest Group reported last year that the cost of dismantling shadow IT accounted for 50 percent or more of IT spending in large enterprises. Considering the pervasive nature of cloud-based services and the popularity of hybrid cloud environments, the Cloud Security Alliance believes the situation is likely much worse today.

Read more in BizTech Magazine


How can we engage?

Please let us know how we can help you on your journey.

Contact Us

"*" indicates required fields

Please review our Privacy Notice and check the box below to consent to the use of Personal Data that you provide.