Ever wondered how you could get your head around the thorny subject of shadow IT without investing too much time?
Shadow IT is the usage of unauthorized tech by employees; usually cloud applications and services. A progression of the Bring Your Own Device (BYOD) debate, I have not said that the applications or services themselves are inherently insecure. Nor that usage is for malicious purposes. Quite the opposite is mostly true.