sun shining through cloudsEarly into my first role as an IT manager, I was faced with a problem that is common today. Users were utilizing shadow IT on a regular basis because they wanted to use newer & more flexible tools. For those blissfully unaware, shadow IT encompasses all of the unauthorized IT gear and applications that are being run outside of the IT department. In my case, these ad hoc solutions had a very ugly spotlight thrown on them when sensitive data was accidentally exposed. The situation involved someone forwarding email to a personal account and using a free cloud storage provider to share data. The pain of picking up the pieces afterwards was significant....Read More