ManagedMethods
  • Products
  • Free Trial
  • How It Works
    • Data Privacy
    • FAQs
  • Supported Apps
    • G Suite
    • Office 365
    • SaaS
  • Use Cases
    • Cyber Safety & Security
    • Data Security
    • Phishing & Malware Protection
    • Account Takeover Prevention
    • Student Self-Harm Detection
  • Customer Success Stories
  • Resources
    • Blog
    • Events & Webinars
    • Success Kits
    • More Resources
  • Company
    • In The News
    • Partners
    • Resellers
    • Careers
  • 1 (303) 415-3640
  • SUPPORT
  • CONTACT
  • Products Free Trial

    Shadow IT Personified

    May 5, 2016

    Imagine walking through the front door of your office. On your left, a robot looks like it is trying to crack a lock on a file cabinet. You say hello to the new hire who already knows the answer to all your website security questions. She’s walking towards you carrying a large stack of folders labelled “Confidential” in big red letters. You hold the door open for her. Everyone is carrying on like nothing is unusual.

    Sound a little crazy? That’s because it is, and these things happen every day with your not-so-visible digital operations.

    What does Shadow IT look like?

    Thousands of digital operations take place on any given work day. For the most part, these activities go unmonitored and unnoticed. Shadow IT is the term used to described the unsanctioned use of cloud apps, which includes:

    • Cloud app login failures
    • File transfers to cloud apps
    • Abnormal cloud app behaviors and anomalies

    Let’s take a peek at what these would look like in the real world:

    A group of men has gathered in your lobby. They sound like Ivan Drago from “Rocky.” One of them asks you if you’d like to come to a party with them later and they hand you a personal invitation. The envelope is thick and the card is well designed. You look back up and they are gone. Weird.

    Jackie the office manager says, “Good morning.” Behind her, you see Jack Harris, who was fired a few weeks ago because he wouldn’t get his sales act together after several incidents. He’s rummaging through the filing cabinets looking at account folders. Jackie doesn’t seem to mind.

    You sit in your chair and wonder, “What the hell is going on?” You put your coffee down on your desk and reach for the keys in your pocket. They are gone. The phone rings. It’s your biggest client. Due to your ongoing relationship, they let you know that Jack Harris reached out to them representing a different company. They reassure you that the account is safe for now, but that they wanted you to know.

    You walk back into the office to see if anyone has seen your keys. The robot trying to crack the lock when you walked in is now helping your new hire carry out more folders. Your keys are on Jackie’s desk. She confirmed her invite from you to the party later. “I didn’t send you an invite to any party.” Before she can reply, an auditor from the government walks through the front door for a review. Then, you hear everyone else in the office confirm their invites.

    Just another day in the digital office.

    Written By: David Waugh

    Share this post

    CLOUD SECURITY INSIGHTS

    Get the latest cloud security insights delivered straight to your mailbox

    GET YOUR FREE TRIAL TODAY!

    Experience visibility and control with cloud security made easy. Start securing your organization’s cloud data!

    Start Your FREE Trial

    Categories

    • Account Takeover (2)
    • Cloud Access Security Broker (CASB) (35)
    • Cloud Risk Management (5)
    • Cloud Security (28)
    • Customer Success Stories (12)
    • Data Loss Prevention (11)
    • G Suite for Education Security (13)
    • Google Cloud Security (10)
    • Higher Ed Cloud Security (4)
    • In The News (107)
    • K-12 Cloud Risks (3)
    • K-12 Cloud Security (18)
    • K-12 Cyber Safety (9)
    • K-12 Cybersecurity (19)
    • K-12 Hybrid Learning Security (4)
    • K-12 Remote Learning (17)
    • Office 365 Cloud Security (7)
    • Product Updates (10)
    • SaaS Security (26)
    • Student Data Privacy (7)
    • The K-12 Tech Experience Podcast (2)

    Related Articles

    Aug 30, 2017 - SaaS Security

    Cloud Email: the obvious next step in cloud security

    Read More
    Jun 6, 2017 - SaaS Security

    Attention: IT has Moved to the Cloud. Why Hasn’t Security?

    Read More
    May 4, 2017 - SaaS Security

    Yesterday’s Google Docs Phishing Scheme: OAuth as an Attack Vector

    Read More
    • How It Works
    • Supported Apps
    • Use Cases
    • Partners
    • Resources
    • Company
    • Terms of Service
    • PRIVACY POLICY
    • Twitter
    • Linkedin
    • Youtube
    ©2020 ManagedMethods - Enfold WordPress Theme by Kriesi
    • Twitter
    • Linkedin
    • Youtube
    • Instagram
    • Facebook
    • How It Works
    • Supported Apps
    • Use Cases
    • Partners
    • Resources
    • Company
    • Terms of Service
    • PRIVACY POLICY
    Do SMBs Really Need a CASB for Cloud Security? Why You Need Cloud App Visibility Why You Need Cloud App Visibility
    Scroll to top