Bringing Shadow IT to the Light
How many spreadsheets, Access databases, macros and user-developed programs are being used within your organisation? What about cloud-based apps and services, like Google Docs, Dropbox, Skype or Slack?
As the use of these “shadow apps” rapidly increase (often undetected and unauthorised) within companies, the debate continues as to whether they support growth and innovation or pose a huge data security risk.
- Outlines the pros and cons of Shadow IT and user-developed applications (UDAs)
- Learn how to improve your existing processes
- Create an IT department that acts as a catalyst for innovation