Examples
Some examples of these unofficial data flows are USB sticks or other portable data storage devices, MSN Messenger or other online messaging software, Gmail or other online e-mail services, Google Docs or other online document sharing and Skype or other online VOIP software, and also other less straightforward products self-developed Access databases and self-developed Excel spreadsheets and macros. Security risks are introduced when data or applications are moved outside protected systems, networks, physical location or security domains.
A 2012 French survey of 129 IT managers revealed some examples of Shadow IT : Excel Macro 19% software 17% Cloud solutions 16% ERP 12% BI systems 9% Websites 8% hardware 6% VoIP 5% Hidden IT guy 5% Shadow IT project 3% What is the shadow member in software project 70% BYoD 3%
Read more about this topic: Shadow IT
Famous quotes containing the word examples:
“It is hardly to be believed how spiritual reflections when mixed with a little physics can hold peoples attention and give them a livelier idea of God than do the often ill-applied examples of his wrath.”
—G.C. (Georg Christoph)
“Histories are more full of examples of the fidelity of dogs than of friends.”
—Alexander Pope (16881744)