Security

now browsing by tag

 
 

Security risks of ‘Shadow IT’ and how to overcome it

The term ‘Shadow IT’ refers to the use of any digital service, IT systems, or software applications inside an organisation without getting it explicitly approved by the Business Unit IT (BUIT) or without the BUIT’s knowledge. Unauthorised apps and a hosted desktop make it extremely easy for the users toRead More

Social media & sharing icons powered by UltimatelySocial