ZeroIn Blog

ZeroIn has been serving the Corte Madera area since 2008, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Forbes Outlines the Risk of the Shadow IT Trend

Article: No. 1 Reason The 'Shadow IT' Trend Is Benefitting Careers But Hampering Companies

Shadow IT refers to the practice of using software or hardware that the IT department of the organization has not approved. As you can imagine, this creates security risks for the organization. I remember the excellent IT team at Twitter would periodically scan our computers for unsanctioned software, and we would have to get approval for any applications or hardware we wanted to use. They encouraged us to "work smarter, not harder", so they would pay for applications and other software if it passed their security requirements and we could demostrate its value to our team. They also provided at no cost to us a TON of tools and hardware to compensate for not being able to use our own systems.

Forbes does a great job outlining how Shadow IT can potentially harm organizations. Many people have no idea about the security risk application, software, and hardware can create. They are almost always not intentionally sabbotaging their company, but simply do not understand the potential harm of their actions.

Moral of the story: While it can be frustrating to wait for approval from the IT team or be restricted from using an application you like, refraining from shadow IT can save your company.

Weighing the Pros and Cons of Cloud vs. On-Premise...
Comment for this post has been locked by admin.


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, June 12, 2024

Captcha Image

News & Updates

Did you know that there are government funded hacking groups in China that target people in the United States? Per this NetWorkWorld article, the FBI uncovered a hacking operation by the China state-funded group Volt Typhoon where they targeted small businesses that used older network switches, the device used in your computer network to connect devices together. They used the access through the old switches as a launching point to target government entities such as water treatment plants, power grids, etc. The article outlines Volt Typhoon's efforts and what the United States had to do to thwart the attacks. This is just one group out of thousands that are always looking for vulnerabilities in computer networks and systems.

Contact Us

Learn more about what ZeroIn can do for your business.

655 Irwin Street Suite B #1046
San Rafael, California 94901