What is ‘Shadow IT’?
Shadow IT refers to the various web tools informally in use within most organisations. These tools are often chosen without reference to IT or to management in general.
They are often used for all the very best reasons. Your colleagues have work to do, and these tools help them, so they get used. You might know about some because there is a subscription charge, but others might be free.
These tools can be anything from simply keeping lists of tasks to do, sharing information or managing workflows, providing newsletter lists, or recruiting staff. Its endless.
There’s all sorts of web pages out there that your people will be finding useful and will be using.
The question is, do you know what is being used on your behalf?
Even more importantly, do you know who’s got access to them? As your staff come and go, do you know to change passwords or reset user accounts to make sure that no one who has left you (maybe even gone to a competitor) is still able to access your confidential data?
Shadow IT is one of the largest threats to data privacy in organisations today. It’s not necessarily because these sites are going to be hacked, although it’s always possible, but it’s because if you don’t know the tools are in use, then there is no way that you can manage them!
The first step to maintaining this data is to identify them, and that’s why you need new tools that are cloud focused.
If you’re still using the same old security tools that you used prior to the cloud, then you are simply not keeping up and we need to talk!
Here’s a story about what happens if you don’t have this under control: Why you need to know all the cloud services that your organisation uses – IT Solutions and Managed Services (new.outsource.co.nz/)
Shadow IT is part of our 10-point cyber-security check list
While there is no single layer of technology that can guarantee you will be safe from hackers, you can reduce your risk by adding layers of protection. How many of our 10-point check list are in place for you?
Easter Eggs aren’t always chocolate
Computer folk love to hide secret 'features' in their code. Normally we reckon these are bugs. But sometimes they are just fun. They are just hidden gems that add a bit of fun, and they're called Easter Eggs. There is a fine tradition of these in popular games,...
A new look for Kinetics
[header2 text="We've listened!" align="center" color="#3ec940" margintop=""] Our client's have told us they love what we do, but our brand is tired. So we're changing it. We've refreshed our logo, and our website - and over the next few weeks we'll work through all...
Introducing Skype for Business
Lync's becoming Skype for Business. It combines the friendliness and familiarity of Skype with the functionality of Lync. It''ll mean that Skype, and Skype for Business will work seamlessly together (although obviously the business version has more capabilities,...
RIP Microsoft Server 2003
Back in 2003 it was unheard of to have email on your mobile phone, in fact it would be another 4 years till the iPhone made its appearance. Aptly named for its time, Server 2003 made it appearance. Since then it has had a great run and if we counted computer years...
Keep your email password safe!
One of the most common irritants in modern computing is being asked to change your password. But it is important, especially your email password. Let me explain… Learning your email address is easy. If I can work out your password, then I can log into pretty much...
Power Outage Lesson
The recent power outage has again reminded us how much we depend on infrastructure over which we have little control. Our Penrose office was in the black out area for most of Sunday. Back in olden times, communication equipment was housed in a telephone exchange. ...
Cryptolocker – Ransoming your data!
Many of us have heard of spyware or malware, programs that try to sell you unnecessary software or pry your credit card details from you. In the last few months we have seen an alarming increase in what is being called ransomware. How are users affected? CryptoLocker...
Create Keyboard Shortcuts for the iPad and iPhone (iOS 7)
It’s getting easier to enter text on mobile devices but there are times when you quickly need to enter a few words or phrase you use often. For example, how many times have you needed to tell someone “On my way”? Once you’ve tried keyboard shortcuts in iPad you’ll...




