Risk and Rewards of Shadow IT

0  comments

The emergence of BYOD (bring your own device) and cloud based applications have changed corporate IT forever.  Gartner predicts that in less than three years, 35% of enterprise IT expenditures will happen outside of the corporate IT budget.

CIOs must embrace the fact that end-users are going to utilize cloud based services and solutions that are outside of IT’s control. IT organizations must transition from “command and control” to “cooperative IT” .  One of IT’s expanding roles in this new world is to develop and implement security and other policies that help rather than hinder employees, regardless of the device they use to do their work.

http://www.cio.com/article/704780/The_Upside_of_Shadow_IT?page=1&taxonomyId=3172

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

You may also like:

Dedicated Vs. Non-Dedicated HIPAA Security Officer
What is a Dedicated and Non-Dedicated HIPAA Security Officer?
What are the primary responsibilities of a HIPAA Security Officer?
What is a HIPAA Security Officer?

Subscribe now to get the latest updates!

>