Posts

Showing posts from February, 2017

We should start talking about "Shadow Cloud"

Image
In 2017, Shadow IT has become a cloudier issue, pun intended People and teams work differently than they did 15, 10, even 5 years ago. Employees want to work from anywhere, chat, collaborate and share information quickly and easily - and on any device. At the same time, they are creating, storing and accessing data exponentially more than they used to. IDC estimates that the amount of data created doubles every two years. The new rules for digital business impose new requirements for new applications, often of the cloud variety. Managing these factors and associated expectations present new challenges for information security. Shadow IT, the use of unauthorized technology applications within an organization's application environment, can be likened to a Trojan horse. Once in use, "shadow" applications can have access to sensitive, confidential and or proprietary data, yet not adhere to any DLP policies you have in place. Worse yet, when not properly identifi