If you are a loyal follower of this blog and are reading this when it is hot-off-the-presses, the weekend is upon us -- and one thing that means, is that a whole bunch of Shadow IT is about to be born. We've covered Shadow IT before on this blog, but today's post is different. It's about -- specifically -- why weekends are an extremely common time for Shadow IT to expand.
Shadow IT Posts
For years, work from home security took a backseat to office security. Then suddenly, everything changed. Work from home security became just as important (and sometimes more important) than office security. As companies grapple with how to make the dream of work from home security a reality, there are a handful of totally avoidable work from home security failures that have come to the forefront. Here are some of the biggest ones.
Why does Shadow IT exist? A starting point is to assume that employees felt they did not have the tools they needed to excel at their job.
Strong WFH cybersecurity is what hackers least expect. Hackers noticed the abrupt upheaval of an incredibly high percentage of previous business processes. And, they saw opportunity. They saw the speedy move away from office-based work environments as exactly...
Shadow IT. It has arrived. But can it coexist with cybersecurity? It must, somehow, because it's not going away and your cyberperimeter must continue to guard your valuable digital (and real) assets -- especially in the context of WFH cybersecurity. Let's start at the beginning -- what is Shadow IT and how did it get here?