The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups

Shadow IT - The Unauthorised Technology That’s Already Inside Your Business


Listen Later

Shadow IT: The Unauthorised Technology Inside Your Business

42% of business applications are unauthorised Shadow IT. Your employees have built hackers a data highway while trying to be helpful.

What You'll Learn

  • ​Detection Methods: DNS monitoring, MDM, endpoint audits, ThreatLocker solutions
  • ​GDPR Nightmare: Why Shadow IT makes data subject access requests impossible
  • ​Real Examples: 17 project management tools in one 12-person company
  • ​Management Strategies: Control without becoming a digital dictator
  • Immediate Actions

    1. ​Audit DNS logs for unknown cloud domains
  • ​Check business credit cards for unauthorised SaaS subscriptions
  • ​Ask employees "How do you actually do this job?"
  • Key Statistics

    • ​ 65% of remote workers use non-approved tools• £80,000 potential GDPR fine for £2M turnover business• 52% of enterprise SaaS apps are unsanctioned

    Featured Solutions

    ThreatLocker: Application whitelisting, DNS filtering, complete visibility without complexity

    Expert Hosts

    Noel Bradford: 40+ years experience, MSP CIOMauven MacLeod: Ex-NCSC cybersecurity expert

    Next Episode

    Technical Debt: The shortcuts strangling your business infrastructure

    🔗 Subscribe for weekly cybersecurity insights💡 Share with business owners who need this⭐ Leave a review to help others find practical security advice

    ...more
    View all episodesView all episodes
    Download on the App Store

    The Small Business Cyber Security Guy | UK Cybersecurity for SMB & StartupsBy The Small Business Cyber Security Guy