CC&G Week 6 Posting - Shadow IT
Shadow IT
Shadow IT includes all forms of IT-related activities and purchases that the IT department isn't involved in (Cisco). Shadow IT can consist of hardware, servers, PCs, packaged software, and cloud services. Cloud services are the most prevalent form of shadow IT, as users can install them easily without the IT or cybersecurity team knowing.
The risk of shadow IT comes from the gap in security. Cloud Access Security Brokers (CASBs) are the key to filling that gap. CASBs monitor user behaviors and cloud application access for risk and unauthorized access. While some devices or applications might be harmless, some can access files or other resources. It is essential for IT and cybersecurity teams to be aware of the potential risks and to keep organizations secure.
Comments
Post a Comment