Intelligent CIO North America Issue 25 | Page 75

t cht lk

CONTAINING AND SECURING SHADOW IT AND TECHNICAL DEBT

Joseph Carson , Chief Security Scientist , Delinea , outlines some typical examples of Shadow IT that organizations should watch out for to maintain their own security .

To curb shadow IT effectively , you have to be aware of the environment in which it arises and why employees choose to use unmanaged apps and services . Here are some typical examples of shadow IT that organizations should watch out for .

With the rise in remote and hybrid work , the number of devices , apps and accounts that organizations must monitor has skyrocketed . With a massive increase in so-called shadow IT , comprehensive visibility has often been completely lost .
With staff driven to solve unexpected challenges at short notice , IT departments have also been accumulating technical debt . The consequences are an increased cyberattack surface and significant additional costs .
Despite the seemingly inevitable nature of these trends , they can be reversed and brought under control with the consistent implementation of transparency , automation and integration .
Shadow IT means any unmanaged IT systems used by employees beyond the radar of IT and security teams .
Shadow IT to watch out for
Shadow IT means any unmanaged IT systems used by employees beyond the radar of IT and security teams . These include cloud accounts , messaging apps and hardware such as laptops or smartphones used without the knowledge of those responsible for IT .
To curb shadow IT effectively , you have to be aware of the environment in which it arises and why employees choose to use unmanaged apps and services .
Here are some typical examples of shadow IT that organizations should watch out for .
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 75