In At The Bleep End
Saturday, December 01, 2007
Wake up to the benefits of shadow IT Link "A failure to meet user demands is resulting in the growth of unauthorised, parallel IT, known as "shadow IT", where users adapt unauthorized tools for corporate and personal tasks. Common examples include the use of social networking sites to replace secure shared discussion areas and the use of instant messaging rather than e-mail. This ultimately results in the reduction of a CIO's control over the use of information and security within the business. And given the increasing pressure for security and compliance in today's business environment, there is a need for this to be resisted." |