Saturday, 25 November 2017

The Rise of the Superuser

 A Knowledge Network Article: Telstra Global


Thursday 11 December 14

Managing the Challenges of Shadow IT   Until recently, the main challenges facing IT departments were selecting the right hardware and software, deploying them quickly at minimal cost and keeping them working. However, a new challenge is edging its way up IT executives’ list of concerns. Many employees are deciding for themselves what IT they need and are proceeding to use it in the workplace without corporate approval.   The risks related to this growing trend – termed Shadow IT – are huge. Because the IT department has not extended its security policies and technical solutions to the unauthorised technology, the company’s IT environment and data may become considerably more vulnerable…

Managing the Challenges of Shadow IT   Until recently, the main challenges facing IT departments were selecting the right hardware and software, deploying them quickly at minimal cost and keeping them working. However, a new challenge is edging its way up IT executives’ list of concerns. Many employees are deciding for themselves what IT they need and are proceeding to use it in the workplace without corporate approval.   The risks related to this growing trend – termed Shadow IT – are huge. Because the IT department has not extended its security policies and technical solutions to the unauthorised technology, the company’s IT environment and data may become considerably more vulnerable…

Please login or register to view this content

Please enable JavaScript to view the comments powered by Disqus.

Newsletter signup

Quickly get on board and up to date with the telecoms industry