Shadow IT—unauthorized applications such as Dropbox or Whatsapp that are used in offices to help workers better collaborate and work—poses an existential threat to an organization’s cybersecurity efforts. Employee use of these applications can blur the line between personal and professional technology uses and increase the chances cybercriminals will access an organization’s networks through exploiting and hacking their employees.

But shadow IT is not solely a security shortcoming that needs to be secured. It is also one of clearest signs that an organization is failing to support or allow open communication and collaboration between its IT department and other in-house teams. Such interaction is an essential, but often forgotten, competent of any organization’s cybersecurity efforts.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]