Tag

Shadow IT

Shadow IT refers to technology tools, software, and services used within an organization without explicit IT department approval. Articles under this tag examine how shadow IT emerges, its impact on security posture, and strategies for detecting and managing unauthorized technology use across your workforce.

posts

Shadow IT

What Is Shadow IT? The Hidden Risk Draining Your Budget

The Breach That Started With a Spreadsheet App In 2023, a midsize healthcare company discovered that an employee had been syncing patient records to an unauthorized cloud storage service for over eight months. The service had no encryption, no access controls, and no audit logging. By the time the security

Carl B. Johnson Oct 27, 2020 7 min read
SaaS Security Best Practices

SaaS Security Best Practices to Protect Your Stack

The SaaS Sprawl Nobody's Watching In 2023, a single misconfigured Salesforce Community site exposed sensitive health records from a government agency in Vermont. The data was public for months before anyone noticed. The application wasn't hacked in any traditional sense — it was simply left open because

Carl B. Johnson Oct 27, 2020 8 min read
BYOD Security Risks

BYOD Security Risks: What's Really on Your Network

The Personal Phone That Took Down a Hospital Network In 2023, a nurse at a mid-sized hospital plugged a personal phone into a workstation USB port to charge it. That phone was already compromised with malware from a sideloaded app. Within 72 hours, threat actors had lateral movement across the

Carl B. Johnson Oct 27, 2020 7 min read
Shadow IT

What Is Shadow IT? The Hidden Risk You Can't Ignore

Your Employees Already Built a Second IT Department In 2023, a Gartner survey found that 41% of employees acquired, modified, or created technology outside of IT's visibility. By now, that number has only grown. If you're asking what is shadow IT, the short answer is this:

Carl B. Johnson Sep 08, 2019 7 min read