Skip to main content

Shadow IT goes home: How to reduce the risk

By April 28, 2020Newsletters

Look back 20 years, when IT was responsible for sourcing, licensing configuring and managing all workplace technology. PCs were kept secure by locking them down so that only approved apps and features were available and Active Directory’s group policies allowed fine-grained control over PCs. The only software allowed was what IT provided and managed. Access to large parts of the web, including social media, was blocked and there was no expectation that users would be able to (or want to) use their PCs at work to access personal data, including private email accounts. 

To read this article in full, please click here

(Insider Story) Refer Here for Original Post and Source

Robert Crossland

Author Robert Crossland

More posts by Robert Crossland
Close Menu