1 post • Page 1 of 1
This article was written by Charlie Trumpess who is a marketing consultant and freelance copywriter.
Shadow or stealth IT doesn’t really lurk in the darkest corners of our organizations. On the contrary, shadow IT hides in plain sight. We see it every time one of our colleagues pulls out their personal smartphone or tablet and uses a free mobile app to share confidential business information across an unsecured network. At that moment your business is completely exposed to hackers, cybercriminals and your competitors. You’re almost certainly in breach of data protection legislation. Worst case scenario, you find yourself ... (read more)