Early into my first role as an IT manager, I was faced with a problem that is common today. Users were utilizing shadow IT on a regular basis because they wanted to use newer & more flexible tools. For those blissfully unaware, shadow IT encompasses all of the unauthorized IT gear and applications that are being run outside of the IT department. In my case, these ad hoc solutions had a very ugly spotlight thrown on them when sensitive data was accidentally exposed. The situation involved someone forwarding email to a personal account and using a free cloud storage provider to share data. The pain of picking up the pieces afterwards was significant....Read More
Systems Alliance Blog
It shouldn’t surprise anyone when the authors of Georgia Tech’s 2014 Emerging Cyber Threats Report say that, “the vast majority of employees now bring mobile devices into the workplace and expect to be able to use their smart-phones and tablets to work from anywhere”. The “Bring Your Own Device” phenomenon is also associated with the rapid rise in data being exported outside organizations' traditional security boundaries.
The increasing use of personal devices to perform work related functions and access employer data creates unique challenges for companies and ultimately their IT staff members. I can’t think of a client I’ve worked with in the past 2 years that wasn’t concerned about, if not actively addressing, the implications of BYOD....Read More