James Mullan New IT Security Threats: The Rise of Shadow IT
Jinfo Article

17th October 2013

By James Mullan

Abstract

James Mullan writes about the new threat of "shadow IT" where staff use software and devices for work reasons which are not approved by the IT department. This follows hard on the heels of the concepts of Bring Your Own Device (BYOD) and Corporately Owned Personally Enabled (COPE) which are also changing the way people work within organisations.

Content Access
Does your organisation have a Jinfo Subscription?

Access to Jinfo Content and Community is available through a Jinfo Subscription.

"Yes"

Please sign in to MyJinfo here so that we can check your access to this item:

Email:

Password:

  Forgotten password?


Or sign in via email:

Enter your email and we'll send you a magic link to sign you in automatically.

"Not yet"

Access to this article is available through a Jinfo Subscription, which will help your organisation:

  1. Save time and money
  2. Re-invent information services
  3. Define, measure and communicate information value.

Subscription Benefits


"Don't know"

Contact us to find out if your organisation already has a Jinfo Subscription.

Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.



 « All Articles