Social Network For Security Executives: Help Make Right Cyber Security Decisions
This article delves into the risk Shadow IT poses. In a recent report Gartner predicted 30% of breaches due to Shadow IT, this further brings the focus to this topic. Let’s take a look at the report and a few mitigation strategies
1.What Gartner Predicted About Shadow IT
Gartner’s Top Security Predictions in 2016 predicted ‘By 2020, a third of successful attacks experienced by enterprises will be on their shadow IT resources.’. Details of the report may be foundhere (which predicts 30% breaches due to Shadow IT)
Shadow IT brings forward all that remains in the shadow. And that has plenty of sensitive data on it. Shadow IT lets unauthorized parties access sensitive data. Thus, it is easy to see what threats Shadow IT brings. You can’t protect what you don’t know exists. That needs us to enable programs to get that kind of information and take mitigation steps to control it.
2. Why Breaches Shall Increase Due To Shadow IT?
It’s the part where sensitive data can be found without much effort and it also has no security as the organizations are unaware of its existence. Hackers find Shadow IT an easy target due to reason like –
3. How To Manage Your Shadow IT Risk?
Mitigation can be hard but the first step is to discover your Shadow IT data. Then comes mitigation.
Here’s some advice from the CSA community. Reference links are provided below