Aug 31, 2022
When employees use unauthorized personal devices for work or when teams download unapproved software for internal use, this is known as shadow IT, says a recent article on FOSSlife , and the practice leads to an array of security and compliance implications for organizations.
BMC says the practice is inevitable, because “users adopt shadow IT practices only to fulfill their job requirements in ways that make their life...