Shadow IT

What Is Shadow IT?

Shadow IT is a term used to describe the use of information technology (IT) systems, applications, and services that are not approved or managed by an organization's IT department. It is often used to refer to the use of unauthorized software, hardware, or services that are not part of the organization's official IT infrastructure. Shadow IT can also refer to the use of existing IT systems and services in ways that are not approved or supported by the organization. Shadow IT can be used to bypass IT policies and procedures, or to access services that are not available through the organization's official IT infrastructure. Shadow IT can also be used to gain access to sensitive data or to circumvent security measures.

Description

Shadow IT is the use of unauthorized IT systems, applications, and services within an organization, often without the knowledge or approval of the organization's IT department.

Usage and Examples

Shadow IT is often used to bypass IT policies and procedures, or to access services that are not available through the organization's official IT infrastructure. For example, an employee may use a cloud storage service to store sensitive data, even though the organization's IT department has not approved the use of such a service. Shadow IT can also be used to gain access to sensitive data or to circumvent security measures. For example, an employee may use a personal laptop to access the organization's network, even though the organization's IT department has not approved the use of such a device.

Previous term
No previous terms!
Next term
No next terms!
Ready to find more vulnerabilities than your last pentest?
Unlock your organization's full security potential and uncover even more vulnerabilities than before by choosing our advanced penetration testing services.