Contact us
Request demo →
Contact us
German website
search
close

Editorial: 6 steps to achieving zero shadow IT

by Pieter Jansen Editorial 17 Nov 2021

Shadow IT has long been a problem for organisations.
Formal IT is routed through the IT department, where it’s
approved, purchased, set up, and, importantly, supported
and maintained.

Shadow IT falls outside this process, and is normally split
into two categories:
/ Systems that the IT department doesn’t know about.
/ Systems the IT department knows about but needs to
keep running as they are integral to business operations.

The second category is the real Shadow IT and the biggest
problem for businesses.

So how can you protect your business from the perils of
shadow IT? Here are Pieter's six steps.

 

Open PDF in new window >

 

Open directories: our research findings

In our previous blogs to this open directory series, we talked about what open directories are and why they pose a risk, and how we set up our own research into the extent of the issue. That also featured a sneak peek into the results. Now that we have presented the findings in our webinar, this article will cover the statistics and most striking examples. And most importantly: what are our conclusions and tips to make your own directories data leak free?

read more

Open Directories: A Peek Into Our Research

In our previous blog, we explained what open directories are and how they can result in a data leak. As mentioned there, we conducted research into the risks of open directories ourselves, to see the extent of the problem. We’ll go into the method and preliminary results of that research here, while leaving the most telling examples and conclusions for our webinar on Wednesday 1 December.

read more

Editorial: 6 steps to achieving zero shadow IT

Shadow IT has long been a problem for organisations. Formal IT is routed through the IT department, where it’s approved, purchased, set up, and, importantly, supported and maintained. Shadow IT falls outside this process, and is normally split into two categories: / Systems that the IT department doesn’t know about. / Systems the IT department knows about but needs to keep running as they are integral to business operations. The second category is the real Shadow IT and the biggest problem for businesses. So how can you protect your business from the perils of shadow IT? Here are Pieter's six steps.

read more

Do you have a question?

Our experts have the answers

Contact us