New IT Security Threats: The Rise of Shadow IT
Jinfo Article
17th October 2013
By James Mullan
Abstract
James Mullan writes about the new threat of "shadow IT" where staff use software and devices for work reasons which are not approved by the IT department. This follows hard on the heels of the concepts of Bring Your Own Device (BYOD) and Corporately Owned Personally Enabled (COPE) which are also changing the way people work within organisations.
Content Access
Does your organisation have a Jinfo Subscription?
Access to Jinfo Content and Community is available through a Jinfo Subscription.
"Yes"
Please sign in to MyJinfo here so that we can check your access to this item:
Or sign in via email:
Enter your email and we'll send you a magic link to sign you in automatically.
"Not yet"
Access to this article is available through a Jinfo Subscription, which will help your organisation:
- Save time and money
- Re-invent information services
- Define, measure and communicate information value.
"Don't know"
Contact us to find out if your organisation already has a Jinfo Subscription.
Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.
- Article title: New IT Security Threats: The Rise of Shadow IT
- Link to this page
- View printable version
- Mobile - Secure, Yes, But Usable Too?
Wednesday, 17th July 2013 - BYOD... Saving Money, But At What Cost?
Monday, 10th June 2013 - Security - Appraise the Doomsayers but Believe the Authorities?
Thursday, 28th March 2013 - Forget BYOD, It's Time to COPE
Wednesday, 31st October 2012
- Defining Big Data: The Four Vs
Friday, 26th April 2013 - Living (and Coping) with Big Data
Thursday, 25th April 2013 - Big data at work
Thursday, 16th August 2012 - BYOD: the risks and the consequences
Monday, 4th June 2012 - The challenge of Bring Your Own Device (BYOD)
Monday, 27th February 2012