Security News > 2020 > May > Security threats associated with shadow IT

Security threats associated with shadow IT
2020-05-18 04:30

One solution to risks associated with shadow IT is to have workers only use cloud apps that have been vetted and approved by your IT department.

There is a vast discrepancy in the intended block rate and the actual block rate, which Skyhigh Networks calls the "Cloud enforcement gap" and represents shadow IT acquisition and usage.

Due to users acquiring shadow IT applications, common risk assessments and preventative measures are typically not performed prior to running unauthorized apps.

Solutions to help manage shadow IT. At the end of the day, you want to make sure you are providing IT teams with a SaaS management solution that brings visibility into the usage, renewal schedules, costs, policy enforcement and security to avoid the consequences of shadow IT. One option is to introduce broad SaaS management and discovery capabilities to track apps using a number of discovery methods.

While companies work to increase employees' knowledge of software apps and security risks, generally speaking we still have a lot to learn when it comes to enterprise security and shadow IT. Companies should embrace new technology and apps in a way that keeps their enterprise data protected, network secure and helps employees reach peak performance levels.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/24G8kDuBGkc/