Many users just download apps or start using unsanctioned services, though, and introduce unnceccesary security risks through "shadow IT."
The link for this article located at CSO Online is no longer available.
Many users just download apps or start using unsanctioned services, though, and introduce unnceccesary security risks through "shadow IT."
The link for this article located at CSO Online is no longer available.