#ShadowIT

June 22, 2016

CLOUD

Gartner Report Says Shadow IT Will Result in 1/3 of Security Breaches

Last week, Gartner published their Top 10 cloud security predictions for 2016. They predict that “by 2020, one third of successful attacks experienced by enterprises will be on their shadow IT resources.” As Gartner rightly points out, the reality is your business is engaging with shadow IT resource…

April 22, 2016

CLOUD

Power of platforms – IT superheroes’ secret weapon

The comic strips of our childhood fascinate us. A once prosperous city falls under the shroud of crime. Enemies of various origins and shapes attack it from all sides. The horizons darken and all seems to be lost. Then magically, the superheroes arrive. Armed with x-ray vision, mighty punches, or ab…

January 19, 2016

CLOUD

Shadow IT: Rampant, Pervasive, and Explosive!

When wireless for LAN burst onto the scene, companies were a lot slower than their employees to embrace it. Employees didn’t want to be tied to their desks.  So they brought in their own wireless access points, stashing them under desks and in conference rooms. Soon companies began realizing they ha…

September 11, 2015

CLOUD

Shadow IT and Breaking a Rule or Two

During my college years, I worked for a major US airline. It was a great job but could get a little rough when faced with cancellations, overbookings, missed connections, etc. However, when faced with challenging situations I was always very calm. I recognized the passengers emotions associated with…

September 10, 2015

CLOUD

#CiscoChat: Managing Shadow IT

Shadow IT is far from a new phenomenon; but the truth is that most IT leaders have little visibility in to the full costs of these services and the risk they represent. And with this gap comes the absence of a proactive strategy for addressing the issue. Companies are using up to 15 to 22 times more…