This post was originally published here by Will Houcheime .
In today’s cloud-first world, employees are sometimes trusted to manage their own projects, giving them freedom to work with the tools of their choosing to complete their tasks. Occasionally, these tools are cloud applications that organizations are not made aware of, making them a security risk that can expose sensitive data. Consequently, organizations have been leveraging a tool called shadow IT discovery. In this way, companies gain insight into what employees are using and how risky these unsanctioned applications truly are.
Shadow IT discovery is important; however, it shouldn’t be the first step to securing your data in the cloud. In our latest Glass Class, we talk about steps that you should prioritize before investigating the unmanaged applications used in your organization. Want to find out more? Watch the latest episode of Glass Class below.
Photo:University of York