Shadow IT

News Upcoming Webinars Trade Shows and Events Press Releases Newsletters Blog
Security Breach

Do It Yourself IT – Increasing in Popularity and Increasing Your Risk of a Security Breach

For a couple of years, shadow IT, sometimes referred to as stealth IT, has been under the radar for many organizations. The way I look at it, you reap what you sow. Organizations expect employees to use their own smartphones, tablets, and laptops – what a nightmare that must be for the IT professionals supporting them.…

Read More

Well, you never said I couldn’t.

A growing problem has reared its ugly head again.  According to an article by Lisa Hoover McGreevy, in Fierce Content Management, IT would like employees to share files securely and with approved applications.…

Read More

I have a little shadow that goes in and out with me.

Little ShadowI don’t know how many of you actually remember or have ever even heard the nursery rhyme. Probably showing my age, or the ability to remember useless snippets. To business. I have been reading for the past few months on the growing problem of business users loading the applications they use, or accessing their personal applications at work.…

Read More