Shadow IT – Security Policy Pillars
Many of our Information Shield customers are asking how to address “Shadow IT” within their information security policy programs. In this article we will identify the common risks with unapproved IT devices and services and how to address them in your governance...