Shadow IT - a Significant Threat for Organisations?
Jinfo Article
30th January 2015
By James Mullan
Abstract
In 2013 James Mullan wrote about "shadow IT" and the potential threat it poses. Now at the start of a new year shadow IT is back on the agenda. There are a number of reasons for this and in this article James looks at two recent reports which highlight some of the concerns organisations have with shadow IT where staff use software and other tools for work reasons which have not been approved by their employers.
Content Access
Does your organisation have a Jinfo Subscription?
Access to Jinfo Content and Community is available through a Jinfo Subscription.
"Yes"
Please sign in to MyJinfo here so that we can check your access to this item:
Or sign in via email:
Enter your email and we'll send you a magic link to sign you in automatically.
"Not yet"
Access to this article is available through a Jinfo Subscription, which will help your organisation:
- Save time and money
- Re-invent information services
- Define, measure and communicate information value.
"Don't know"
Contact us to find out if your organisation already has a Jinfo Subscription.
Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.
- Article title: Shadow IT - a Significant Threat for Organisations?
- Link to this page
- View printable version
- Cloud Services - Not In the Cloud At All
Thursday, 13th November 2014 - Security Breaches? It's the Innocent Ones You Need To Worry About
Wednesday, 12th March 2014 - Cyber Security in the Enterprise
Thursday, 9th January 2014 - The Cloud - Too Important to be Left to IT
Monday, 28th October 2013 - New IT Security Threats: The Rise of Shadow IT
Thursday, 17th October 2013
- BYOD and the Security Nightmare
Friday, 4th April 2014 - BYOD: the risks and the consequences
Monday, 4th June 2012 - The challenge of Bring Your Own Device (BYOD)
Monday, 27th February 2012