Shadow IT is the tools that employees have long used without IT approval, but during the pandemic they have become more complex and less manageable. Experts interviewed by Information Age tell us how to use them without harming the enterprise.
Shadow IT is becoming increasingly common in companies across industries, largely because remote workers are abandoning the tools provided by IT and seeking more flexible alternatives. But while using such applications can speed up workflows, shadow IT comes with its own set of security risks. It’s important to understand how IT teams can mitigate these while maintaining high productivity.
Priority to cooperation
Over the past year, collaboration across algeria whatsapp data has become more important than ever, including when it comes to combating shadow IT. “Shadow IT is an interesting issue, it’s certainly a big concern for companies, and with the shift to remote working, the risk of it expanding has increased exponentially,” explains Richard Slater, head of managed services at Amido. “But the trick to tackling it is to acknowledge it and not ignore it. By making a concerted effort to understand why teams are using unauthorized technology, you can foster a culture of collaboration. Once you understand what they want, you can help them.”
He says that honesty and openness from management encourages teams to turn to the CIO for help in implementing secure solutions, while secrecy only exacerbates the initial problem. “A lot of the problem with shadow IT is the perception that IT teams are not responsive to the needs of the organization, but prioritizing collaboration helps combat this perception and reduce the risk of shadow IT,” he adds.
How to Secure Shadow IT in the Age of Hybrid Work
-
- Posts: 560
- Joined: Mon Dec 23, 2024 3:16 am