#ShadowIT
Gartner Report Says Shadow IT Will Result in 1/3 of Security Breaches
2 min read
Last week, Gartner published their Top 10 cloud security predictions for 2016. They predict that “by 2020, one third of successful attacks experienced by enterprises will be on their shadow IT resources.” As Gartner rightly points out, the reality is your business is engaging with shadow IT resources and they shoot a big hole in […]
Power of platforms – IT superheroes’ secret weapon
3 min read
The comic strips of our childhood fascinate us. A once prosperous city falls under the shroud of crime. Enemies of various origins and shapes attack it from all sides. The horizons darken and all seems to be lost. Then magically, the superheroes arrive. Armed with x-ray vision, mighty punches, or ability to freeze the enemies […]
Shadow IT: Rampant, Pervasive, and Explosive!
4 min read
When wireless for LAN burst onto the scene, companies were a lot slower than their employees to embrace it. Employees didn’t want to be tied to their desks. So they brought in their own wireless access points, stashing them under desks and in conference rooms. Soon companies began realizing they had a big mess of […]
Shadow IT and Breaking a Rule or Two
5 min read
During my college years, I worked for a major US airline. It was a great job but could get a little rough when faced with cancellations, overbookings, missed connections, etc. However, when faced with challenging situations I was always very calm. I recognized the passengers emotions associated with the situation were mostly because they had somewhere […]
#CiscoChat: Managing Shadow IT
1 min read
Shadow IT is far from a new phenomenon; but the truth is that most IT leaders have little visibility in to the full costs of these services and the risk they represent. And with this gap comes the absence of a proactive strategy for addressing the issue. Companies are using up to 15 to 22 times more cloud services […]
1