CIOs adopt varied approaches to 'shadow IT'

Federal Times: Ask any CIO about the use of unauthorized software and devices at their agencies, and you’ll likely get an earful. But just what that earful consists of is likely to vary widely from one person to the next.

Working on personal smartphones or tablets, hosting information on free servers, workarounds using online services or unauthorized apps — the use of so-called “shadow IT” poses a serious problem for many CIOs. Some try to limit their department’s exposure by being agile enough to provide secure alternatives.

Read article

Tags

Share