paint-brush
An In-depth Look at Shadow ITby@terencewong
405 reads
405 reads

An In-depth Look at Shadow IT

by Terence Wong6mSeptember 13th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Employees create and use their own IT resources that are invisible to IT department. This is known as shadow IT, when IT department oversees and manages IT resources. Everest Group predicts that more than 50% of technology spending in organizations was due to shadow IT. Shadow IT is wide-spread and growing, so it's a matter of managing the risk. The rise of cloud technology compounds this problem, making it easier than ever for employees to use unapproved IT resources. Shadow IT increases the risk of security breaches, as resources are outside IT departments' control.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - An In-depth Look at Shadow IT
Terence Wong HackerNoon profile picture
Terence Wong

Terence Wong

@terencewong

Software engineer who loves problem-solving and technology. Technical Content Creator at Octopus.

Learn More
LEARN MORE ABOUT @TERENCEWONG'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Terence Wong HackerNoon profile picture
Terence Wong@terencewong
Software engineer who loves problem-solving and technology. Technical Content Creator at Octopus.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Everestgrp