• Advertising
  • Disclaimer
  • Contact us
  • About us
WTM News
Web Hosting and Linux/Windows VPS in USA, UK and Germany
  • Home
  • entertainment
    • All
    • games
    • movies
    • music
    • sports
    'Elvis': Austin Butler ascends to the Olympus of rock in the final trailer of the Baz Luhrmann biopic

    ‘Elvis’: Austin Butler ascends to the Olympus of rock in the final trailer of the Baz Luhrmann biopic

    'Stranger Things': This is the duration of the nine chapters of the fourth season

    ‘Stranger Things’: This is the duration of the nine chapters of the fourth season

    Sony denies that 'Bad Boys 4' is in danger and defends Will Smith

    Sony denies that ‘Bad Boys 4’ is in danger and defends Will Smith

    'High School Musical: The Musical: The Series' renewed for a fourth season, Olivia Rodrigo will only be a guest star

    ‘High School Musical: The Musical: The Series’ renewed for a fourth season, Olivia Rodrigo will only be a guest star

    'The paper house: Korea': New trailer with the Professor, Tokyo and a union between the two Koreas

    ‘The paper house: Korea’: New trailer with the Professor, Tokyo and a union between the two Koreas

    'Riverdale' renewed for a seventh season, but it will be the last

    ‘Riverdale’ renewed for a seventh season, but it will be the last

  • business
    • All
    • startups
    bitumen 60/70

    Iran Bitumen

    Study Smart: Tips and Tricks to Ace the GED Test

    Study Smart: Tips and Tricks to Ace the GED Test

    Things to Remember When Taking the GED Math Test

    Things to Remember When Taking the GED Math Test

    DutyCope is the newest freelance platform

    Dutycope is the newest freelance platform

    What plans does NASA have to continue working with Russia?

    What plans does NASA have to continue working with Russia?

    Dutycope, the introduction of one of the best freelance sites

    Dutycope, the introduction of one of the best freelance sites

    Boeing's $ 450 million investment in Wisk Aero

    Boeing’s $ 450 million investment in Wisk Aero

    FedEx uses a laser defense system to defend its aircraft against missile attacks

    FedEx uses a laser defense system to defend its aircraft against missile attacks

    Tim Cook earned over $ 98 million last year!

    Tim Cook earned over 98 million Dollar last year!

  • Technology
    • All
    • apps
    • gadget
    • mobile
    Robots and homes with empathy: the next step in the care of the elderly |  Technology

    Robots and homes with empathy: the next step in the care of the elderly | Technology

    DES2022 BARACK OBAMA

    Barack Obama will be present at DES2022

    “I am concerned that large companies like Google, Microsoft, Facebook or Amazon have almost infinite resources” |  Technology

    “I am concerned that large companies like Google, Microsoft, Facebook or Amazon have almost infinite resources” | Technology

    datos no estructurados

    Unstructured data, basis of innovation

    Hoan Ton-That doesn't care about the Geneva Convention |  Technology

    Hoan Ton-That doesn’t care about the Geneva Convention | Technology

    Hannover Messe 2022: toda la tecnología para la industria

    all the technology for the industry

    Trending Tags

  • lifestyle
    • All
    • foods
    • health
    • travel
    3 Days in Dubai – Where to Visit in Dubai

    3 Days in Dubai – Where to Visit in Dubai

    Ata Ghotbi and the road to success

    Ata Ghoutbi and the Road to Success

    5 ways to open frozen pipes without damaging the pipe

    5 ways to open frozen pipes without damaging the pipe

    Why is it better not to use toilet paper?

    Why is it better not to use toilet paper?

    Why do we have to put a pillow between our knees at night?

    Why do we have to put a pillow between our knees at night?

    Two mistakes men make in bed that ruin sex for women!

    Two mistakes men make in bed that ruin sex for women!

    Trending Tags

  • Review
    Review of the first part of the fifth season of the Money Heist series

    Review of the first part of the fifth season of the Money Heist series

    Introduction of Solar Ash game

    Introducing and reviewing the interesting game Solar Ash

    Review Huawei WATCH FIT smartwatch

    Review Huawei WATCH FIT smartwatch

  • Videos
No Result
View All Result
  • Home
  • entertainment
    • All
    • games
    • movies
    • music
    • sports
    'Elvis': Austin Butler ascends to the Olympus of rock in the final trailer of the Baz Luhrmann biopic

    ‘Elvis’: Austin Butler ascends to the Olympus of rock in the final trailer of the Baz Luhrmann biopic

    'Stranger Things': This is the duration of the nine chapters of the fourth season

    ‘Stranger Things’: This is the duration of the nine chapters of the fourth season

    Sony denies that 'Bad Boys 4' is in danger and defends Will Smith

    Sony denies that ‘Bad Boys 4’ is in danger and defends Will Smith

    'High School Musical: The Musical: The Series' renewed for a fourth season, Olivia Rodrigo will only be a guest star

    ‘High School Musical: The Musical: The Series’ renewed for a fourth season, Olivia Rodrigo will only be a guest star

    'The paper house: Korea': New trailer with the Professor, Tokyo and a union between the two Koreas

    ‘The paper house: Korea’: New trailer with the Professor, Tokyo and a union between the two Koreas

    'Riverdale' renewed for a seventh season, but it will be the last

    ‘Riverdale’ renewed for a seventh season, but it will be the last

  • business
    • All
    • startups
    bitumen 60/70

    Iran Bitumen

    Study Smart: Tips and Tricks to Ace the GED Test

    Study Smart: Tips and Tricks to Ace the GED Test

    Things to Remember When Taking the GED Math Test

    Things to Remember When Taking the GED Math Test

    DutyCope is the newest freelance platform

    Dutycope is the newest freelance platform

    What plans does NASA have to continue working with Russia?

    What plans does NASA have to continue working with Russia?

    Dutycope, the introduction of one of the best freelance sites

    Dutycope, the introduction of one of the best freelance sites

    Boeing's $ 450 million investment in Wisk Aero

    Boeing’s $ 450 million investment in Wisk Aero

    FedEx uses a laser defense system to defend its aircraft against missile attacks

    FedEx uses a laser defense system to defend its aircraft against missile attacks

    Tim Cook earned over $ 98 million last year!

    Tim Cook earned over 98 million Dollar last year!

  • Technology
    • All
    • apps
    • gadget
    • mobile
    Robots and homes with empathy: the next step in the care of the elderly |  Technology

    Robots and homes with empathy: the next step in the care of the elderly | Technology

    DES2022 BARACK OBAMA

    Barack Obama will be present at DES2022

    “I am concerned that large companies like Google, Microsoft, Facebook or Amazon have almost infinite resources” |  Technology

    “I am concerned that large companies like Google, Microsoft, Facebook or Amazon have almost infinite resources” | Technology

    datos no estructurados

    Unstructured data, basis of innovation

    Hoan Ton-That doesn't care about the Geneva Convention |  Technology

    Hoan Ton-That doesn’t care about the Geneva Convention | Technology

    Hannover Messe 2022: toda la tecnología para la industria

    all the technology for the industry

    Trending Tags

  • lifestyle
    • All
    • foods
    • health
    • travel
    3 Days in Dubai – Where to Visit in Dubai

    3 Days in Dubai – Where to Visit in Dubai

    Ata Ghotbi and the road to success

    Ata Ghoutbi and the Road to Success

    5 ways to open frozen pipes without damaging the pipe

    5 ways to open frozen pipes without damaging the pipe

    Why is it better not to use toilet paper?

    Why is it better not to use toilet paper?

    Why do we have to put a pillow between our knees at night?

    Why do we have to put a pillow between our knees at night?

    Two mistakes men make in bed that ruin sex for women!

    Two mistakes men make in bed that ruin sex for women!

    Trending Tags

  • Review
    Review of the first part of the fifth season of the Money Heist series

    Review of the first part of the fifth season of the Money Heist series

    Introduction of Solar Ash game

    Introducing and reviewing the interesting game Solar Ash

    Review Huawei WATCH FIT smartwatch

    Review Huawei WATCH FIT smartwatch

  • Videos
No Result
View All Result
WTM News
No Result
View All Result
  • Home
  • entertainment
  • business
  • Technology
  • lifestyle
  • Review
  • Videos
Home Technology

the business nightmare

News writer by News writer
March 28, 2022
in Technology
7 0
A A
0
shadow IT

the business nightmare

153
SHARES
235
VIEWS
Share on FacebookShare on Twitter

the business nightmare
is the headline of the news that the author of WTM News has collected this article. Stay tuned to WTM News to stay up to date with the latest news on this topic. We ask you to follow us on social networks.

We live with it, but ignorance of the term means that we do not know exactly what we mean when we hear it. Although, Shadow IT is the order of the day, and it is a problem that all companies in the world face and that can pose a more important threat than it appears to be.

But what is it exactly? How does this situation occur? What does it mean for organizations? Next, we shed light on all these questions.

The term Shadow IT refers to any technological element (hardware, software, cloud…) that is used by a user without the authorization and knowledge of the IT manager of your organization. That is, when a worker makes decisions on his own without agreeing with his superior, and decides, for example, to use a cloud-based service without previously discussing it with the company.

Data breaches and leaks

As usual, each company provides its equipment and programs to its employees, but many of them also download and install other programs that are not supervised by the IT department. Approximately 82% of companies are unaware of all the applications used by their workers on a daily basis.

It is a more recurrent practice than we currently believe. According to IBM Security, “One in three employees share and upload corporate data to third-party cloud applications,” as well as “one in four connect to cloud solutions using their corporate username and password.”

The term Shadow IT refers to any technological element (hardware, software, cloud…) that is used by a user without authorization

With telecommuting, users have made use of their own devices such as smartphones or personal laptops for work matters, where they have indirectly shared corporate documents through cloud storage applications, unauthorized networks, uncontrolled computers or third-party applications. Saas type third parties. It should be noted that only 7% of these free internet applications meet minimum security standards, so the people who use them unknowingly expose the organization.

Why it occurs and how it can be managed

Mainly this type of situation occurs for a reason of need of the user to solve a specific situation. For example, when the employee has to send several large files that cannot be attached to an email due to their volume, or when he can perform a specific function because his team does not allow it.

All this a priori can represent a series of advantages such as immediacy, autonomy and efficiency when working, we can even believe that it translates into savings for our company. Nothing could be further from the truth. The truth is that Shadow IT leaves the door open to lack of control, data leakage, theft of confidential information and endless vulnerabilities that translate into a nightmare of costs, inefficiencies and even the complete stoppage of business activity.

How the CISO can combat Shadow IT in the company: Tips and recommendations

The best way to combat the threats and risks of Shadow IT is through the application of guidelines, good practices, policies and initiatives managed by the IT team, and increasingly through the figure of the CISO (Responsible for Security), which are proportional to the technical and budgetary possibilities of the company and to the needs of the business. Some keys to regain control in the different action vectors are:

1) Analyze the processes and the way of working: this task is more typical of the departments of a company than of the IT manager. It consists of periodically reviewing how each department works and the needs in their work processes. This analysis will allow us to check if the existing technological tools are sufficient or whether new elements need to be incorporated into their way of working. This is where we can identify if these necessary new technological elements comply with the necessary security measures and have them identified and under control.

2) Inventory and monitor: It is important to maintain a catalog of hardware, software and cloud applications and, in turn, to have network monitoring, analysis and checking methods that allow us to verify that the configurations of our technological elements have not undergone changes. For example, MDM (mobile device management) allow us to manage the hardware and software park of an organization remotely, controlling the applications used and installable at all times. Firewalls and IDS will allow us to monitor the traffic of our network.

3) Identify and act: At the moment we detect a threat, we must analyze and assess the advantages it entails, the drawbacks and the impact on the business. The adoption of the new element can suppose the solution and an improvement, but it is necessary to weigh the possibility that there is a safer and optimal alternative to perform the same function.

4) Raise awareness: An important initiative consists of training employees and educating them on security issues so that they are aware that their actions can entail great risks for the company. Workers must be aware of how dangerous actions carried out in the shadows without informing our IT manager can be.

Although, the most important key to manage this type of situation and put an end to it, is to have tools that allow companies to eliminate Shadow IT. In short, it is essential to have solutions that allow managing the input and output conduit for communication of employee files, in a secure, monitored, audited and efficient manner.

By Julius Prada CEO of Transfer

Source: revistabyte.es

Tags: businessnightmare
Previous Post

This is the new San Diego version of Now Platform

Next Post

Scholz’s Social Democrats win the Saarland after 22 years of conservative rule | International

News writer

News writer

I try to find the best news for you and publish it on WTM News. Follow my articles to become an up-to-date person!

Related Posts

Robots and homes with empathy: the next step in the care of the elderly |  Technology
Technology

Robots and homes with empathy: the next step in the care of the elderly | Technology

May 25, 2022
DES2022 BARACK OBAMA
Technology

Barack Obama will be present at DES2022

May 25, 2022
“I am concerned that large companies like Google, Microsoft, Facebook or Amazon have almost infinite resources” |  Technology
Technology

“I am concerned that large companies like Google, Microsoft, Facebook or Amazon have almost infinite resources” | Technology

May 25, 2022
datos no estructurados
Technology

Unstructured data, basis of innovation

May 24, 2022
Hoan Ton-That doesn't care about the Geneva Convention |  Technology
Technology

Hoan Ton-That doesn’t care about the Geneva Convention | Technology

May 24, 2022
Hannover Messe 2022: toda la tecnología para la industria
Technology

all the technology for the industry

May 24, 2022
Next Post
Scholz's Social Democrats win the Saarland after 22 years of conservative rule |  International

Scholz's Social Democrats win the Saarland after 22 years of conservative rule | International

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Tesla's new update notifies the driver of tire wear

Tesla’s new update notifies the driver of tire wear

December 16, 2021
Time Magazine introduced Elon Musk as the character of 2021!

Time Magazine introduced Elon Musk as the character of 2021!

December 15, 2021
Introduction of Solar Ash game

Introducing and reviewing the interesting game Solar Ash

December 15, 2021
Review of the first part of the fifth season of the Money Heist series

Review of the first part of the fifth season of the Money Heist series

December 15, 2021
Introduction of Solar Ash game

Introducing and reviewing the interesting game Solar Ash

0
Added the ability to check voice messages before sending to WhatsApp!

Added the ability to check voice messages before sending to WhatsApp!

0
Time Magazine introduced Elon Musk as the character of 2021!

Time Magazine introduced Elon Musk as the character of 2021!

0
Review of the first part of the fifth season of the Money Heist series

Review of the first part of the fifth season of the Money Heist series

0
Downing Street party report calls on government 'leaders' to take responsibility |  International

Downing Street party report calls on government ‘leaders’ to take responsibility | International

May 25, 2022
Robots and homes with empathy: the next step in the care of the elderly |  Technology

Robots and homes with empathy: the next step in the care of the elderly | Technology

May 25, 2022
Russia sanctions: Brussels takes first legal step to seize Russian assets to help rebuild Ukraine |  International

Russia sanctions: Brussels takes first legal step to seize Russian assets to help rebuild Ukraine | International

May 25, 2022
DES2022 BARACK OBAMA

Barack Obama will be present at DES2022

May 25, 2022

Latest News

Downing Street party report calls on government 'leaders' to take responsibility |  International

Downing Street party report calls on government ‘leaders’ to take responsibility | International

May 25, 2022
Robots and homes with empathy: the next step in the care of the elderly |  Technology

Robots and homes with empathy: the next step in the care of the elderly | Technology

May 25, 2022
Russia sanctions: Brussels takes first legal step to seize Russian assets to help rebuild Ukraine |  International

Russia sanctions: Brussels takes first legal step to seize Russian assets to help rebuild Ukraine | International

May 25, 2022
DES2022 BARACK OBAMA

Barack Obama will be present at DES2022

May 25, 2022

Suggest application sites

Weltnachrichten

Nachrichten Star

Dutycope

Freelance sites

WTM News

WTM News is a smart magazine that collects new and important technology news of the world for you from all over the web.
Our goal is to compile the best news so that you can more easily get the latest technology news in the world.

Follow us

News Categories

  • apps
  • business
  • entertainment
  • Environment
  • foods
  • gadget
  • games
  • health
  • lifestyle
  • mobile
  • movies
  • music
  • News
  • Other
  • Review
  • science
  • sports
  • startups
  • Technology
  • travel
  • Videos

Freelancer | Logo design | Hervess | Nachrichten Star

latest news

Review of the first part of the fifth season of the Money Heist series

The fifth season of Money Heist series

The points given are based solely on the personal taste of
Introduction of Solar Ash game

Solar Ash game

Score against the average score of this game on the site

WTM NEWS Magazine is just a portal for republishing news in various fields. All news will be placed on the site by mentioning the source. WTM NEWS has no legal responsibility for the accuracy of the news and articles and only reposts the news. © 2022 WTM NEWS

No Result
View All Result
  • Home
  • entertainment
  • business
  • Technology
  • lifestyle
  • Review
  • Videos

WTM NEWS Magazine is just a portal for republishing news in various fields. All news will be placed on the site by mentioning the source. WTM NEWS has no legal responsibility for the accuracy of the news and articles and only reposts the news. © 2022 WTM NEWS

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist