
Episodes

6 days ago
6 days ago
Shadow IT: Identifying and Managing Unauthorized Technology Use
In this episode of 'Off the Wire,' Tanner and Anthony discuss 'Shadow IT' and its implications on organizational security and efficiency. They delve into concrete examples, such as unauthorized software subscriptions and unapproved hardware purchases. Tanner and Anthony provide insights on why users engage in Shadow IT and the risks associated with it. They emphasize the importance of communication and understanding user needs to manage and potentially reduce Shadow IT. They also share practical tips and tools for identifying and mitigating the risks related to unauthorized technology use within an organization.
00:00 Introduction and Welcome
00:49 Understanding Shadow IT
01:36 Real-Life Examples of Shadow IT
03:20 Addressing Shadow IT Concerns
08:48 Risks and Security Implications
11:48 Tools and Strategies to Detect Shadow IT
15:59 Effective Communication and User Engagement
24:33 Final Thoughts and Conclusion
Comments (0)
To leave or reply to comments, please download free Podbean or
No Comments
To leave or reply to comments,
please download free Podbean App.