Tech pros are responsible for controlling and safeguarding data; employees want to accomplish tasks as efficiently as possible. As a result, more workers have begun to use cloud-based tools without consulting IT to verify their security.
This is the key takeaway from a new SpiceWorks study entitled “Data Snapshot: Security, privacy, and the shadowy risks of bypassing IT.” To learn more about the growth and risk of this practice known as “shadow IT,” researchers surveyed 338 IT pros across North America, Europe, the Middle East, and Africa.
Leave a reply