
Sign up to save your podcasts
Or
In this enlightening episode, we delve into the secret world of Shadow IT. Our guest, John Harden from Auvik, explains the definition and different forms of Shadow IT, highlighting the lurking data security risks. With the rise of remote work, the use of unapproved tools has accelerated, leaving digital data breadcrumbs that can compromise security. We explore how IT teams can tackle these challenges by balancing convenience and security, ultimately transforming Shadow IT into innovation.
Connect with John on LinkedIn: https://www.linkedin.com/in/john-harden/
Check out the SaaS Apps on Auvik: https://www.auvik.com/saas-management/
Want to find out more about Security Awareness Training? Check out Phin Securities: https://www.phinsec.io/
Connect with Connor on LinkedIn: https://www.linkedin.com/in/connor-swalm/
In this enlightening episode, we delve into the secret world of Shadow IT. Our guest, John Harden from Auvik, explains the definition and different forms of Shadow IT, highlighting the lurking data security risks. With the rise of remote work, the use of unapproved tools has accelerated, leaving digital data breadcrumbs that can compromise security. We explore how IT teams can tackle these challenges by balancing convenience and security, ultimately transforming Shadow IT into innovation.
Connect with John on LinkedIn: https://www.linkedin.com/in/john-harden/
Check out the SaaS Apps on Auvik: https://www.auvik.com/saas-management/
Want to find out more about Security Awareness Training? Check out Phin Securities: https://www.phinsec.io/
Connect with Connor on LinkedIn: https://www.linkedin.com/in/connor-swalm/