Forum
Sign up Calendar Latest Topics
 
 
 


Reply
  Author   Comment  
trish0112

Member
Registered:
Posts: 31
Reply with quote  #1 
Has anyone heard of Shadow IT or Stealth IT? i heard our IT department explaining it to some of our employees, but i definitely don't have any idea on what it really is.  Is there anyone here who works in the IT department that could explain it? Thanks!
0
Kevin

Avatar / Picture

Senior Member
Registered:
Posts: 279
Reply with quote  #2 
Basically it is unauthorized equipment on your network. For instance, you put your own wireless access point at your desk in between your computer and the wall jack. This is because you wanted wifi on your smart phone. These "devices in the shadows" are serious security breaches that can result in easily hacked networks and other issues.
__________________
 
1
Kevin

Avatar / Picture

Senior Member
Registered:
Posts: 279
Reply with quote  #3 
Another example that might help understand the problem of Shadow or Stealth IT is services like DropBox or Amazon Web Services. People are uploading business data to their personal storage locations and working on there files there. These are out of control of the business they belong to, they aren't being backed up and again private information is possibly being exposed when it shouldn't be.
__________________
 
0
trish0112

Member
Registered:
Posts: 31
Reply with quote  #4 
Thanks for explaining it in a way that a not so tech savvy person like me could understand lol. I'm quite guilty of using cloud apps a lot and not all of 'em are permitted by the company I'm working for but it gets the job done. The IT people are currently working on addressing ShadowIT but what would it mean for us? Does that mean we'll no longer be able to use cloud based apps unless permitted by the office?
0
Kevin

Avatar / Picture

Senior Member
Registered:
Posts: 279
Reply with quote  #5 
That is a good question Trish.

It will really depend on your company. Cloud based services, external email accounts (gmail, hotmail, etc) may all be blocked. Social media may not be permitted within the organizations. They can go as far as ensuring that outside equipment cannot be connected to the network, you can't bring in a laptop or even connect your iPhone to the wifi in some offices.

All of the above is blocked in many Federal Government Agencies, while others do not block any of it. It literally depends on what the business of the organization is and what the value of the business data could be to someone else if it is exposed.

A few examples but not an exhaustive list might be CRA, CBSA, RCMP, and CSIS.

More and more I am seeing businesses looking for the same security.

__________________
 
0
Previous Topic | Next Topic
Print
Reply

Quick Navigation:

Easily create a Forum Website with Website Toolbox.