The Shadow IT Paradox
Why Even Security Pros Are Using Unsanctioned Apps and AI
In a surprising revelation, a recent study by Next DLP has uncovered that a staggering 73% of cybersecurity professionals have used unsanctioned apps, including AI tools, in the past year. This finding, also based on interviews with 250 security pros at major industry events, highlights a significant disconnect between security best practices and actual behavior.
????????? ?????????????????????????:?
* 73% of security professionals used unauthorized apps in the past year
* 65% acknowledge data loss as a top risk of shadow IT
* 10% admit that shadow IT led to a data breach
* Only 37% have developed policies for using these tools
* 20% were unaware of corporate policies or training to mitigate shadow IT risk
?????? ??????????????: It's ironic that those tasked with protecting organizational data are themselves contributing to potential security risks. This raises an important question:
领英推荐
?????? ???? ??????????????????, ???????? ????????????????-?????????????????? ????????, ???????? ???? ???????????? ???? ?????? ???? ???????????????????
Common Reasons for Shadow IT Usage:
The ?????????? ???????? is to raise awareness of the issue. ?????????????? ???????? ?????????????????? about the risks of shadow IT and the importance of using sanctioned tools. You should also provide them with the training they need to use these tools effectively.
In addition to education, you should also take steps to ???????? ???????? ???????????????????? ?????????? ???????? ????????-????????????????. If your employees find that the sanctioned tools are easy to use and meet their needs, they will be less likely to resort to shadow IT.
Finally, you should ???????????? ?? ?????????????? ???? ???????? ?????????????????????????? where employees feel comfortable coming to you with their concerns about sanctioned tools. If employees know that they can raise issues without fear of reprisal, they will be more likely to do so.
By ?????????????????????????? ?????? ?????????????????????? ???????????? ???????????? ???? ??????, companies can develop more effective strategies to manage this risk while still meeting the needs of their workforce.
What's your experience with shadow IT in your organization? How do you balance security needs with employee tool preferences?