Federal Times: Ask any CIO about the use of unauthorized software and devices at their agencies, and you’ll likely get an earful. But just what that earful consists of is likely to vary widely from one person to the next.
Working on personal smartphones or tablets, hosting information on free servers, workarounds using online services or unauthorized apps — the use of so-called “shadow IT” poses a serious problem for many CIOs. Some try to limit their department’s exposure by being agile enough to provide secure alternatives.
The most significant government policy, business, and technology news and analysis delivered to your inbox.
Subscribe Nowi360Gov is an intelligent network of websites and e-newsletters that provides government business, policy and technology leaders with a single destination for the most important news and analysis regarding their agency strategies and initiatives.
Telephone: 202.760.2280
Toll Free: 855.i360.Gov
Fax: 202.697.5045
The most significant government policy, business, and technology news and analysis delivered to your inbox.
Subscribe Now