0% found this document useful (0 votes)
61 views1 page

Modern Workplace

Employees frequently bypass IT departments and use unauthorized apps, personal email accounts, and cloud services for work needs, known as "Shadow IT". This puts company information and systems at risk by making IT governance and security difficult. Companies can outsmart Shadow IT by 1) giving employees collaboration tools and easy file sharing, 2) allowing flexible work from any device, and 3) gaining visibility into all IT usage to detect threats. Office 365 provides secure productivity tools that can help address Shadow IT issues.

Uploaded by

Yusuf Kusuma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views1 page

Modern Workplace

Employees frequently bypass IT departments and use unauthorized apps, personal email accounts, and cloud services for work needs, known as "Shadow IT". This puts company information and systems at risk by making IT governance and security difficult. Companies can outsmart Shadow IT by 1) giving employees collaboration tools and easy file sharing, 2) allowing flexible work from any device, and 3) gaining visibility into all IT usage to detect threats. Office 365 provides secure productivity tools that can help address Shadow IT issues.

Uploaded by

Yusuf Kusuma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

3 WAYS TO OUTSMART

SHADOW

Shadow IT. Stealth IT. BYOD. The facts are hard to


avoid. Employees frequently bypass IT to meet their
business needs with downloaded apps, personal
email, and unauthorized cloud services.

87%
72% of senior managers
regularly upload work
files to a personal email
of executives don’t
know how many or cloud account. i

Shadow IT applications
are being used within
their organization. ii

DANGERS
LURK IN THE
SHADOWS
Shadow IT puts information and systems at risk—while driving up
costs and making it difficult to manage IT governance and growth.

3 WAYS TO
OUTSMART
SHADOW IT

GIVE EMPLOYEES THE


CAPABILITIES THEY WANT.
Simplify work by giving people tools to collaborate on
documents and easily store and share large files.

80%
of IT professionals have
received employee requests
for file sharing and
iii
collaboration services.

37%
of users have uploaded
sensitive data to a file
sharing service. iv

ALLOW EMPLOYEES TO WORK


FROM ANYWHERE, ON ANY DEVICE.
Remove productivity blockers with tools that make work
easy on their favorite devices.

77%
of workers feel more productive
v
when working offsite.

240
The number of extra work
HOURS

hours each remote worker


vi
delivers per year.

GAIN VISIBILITY
INTO IT USAGE.
Detect threats by identifying high-risk activities and uncover
Shadow IT applications and unauthorized cloud storage.

83%
of CIOs experience some level
80%
of employees admit to using non-
viii
of unauthorized provisioning approved SaaS apps in their jobs.
of cloud services. vii

Of the 1000+ cloud services used by


enterprises, 44 are considered high
risk to the business. ix

Office 365 helps you outsmart Shadow IT with secure, scalable,


on-the-go productivity for today’s modern workplace.

See Office 365 at work in the


Modern Workplace webcast series at
www.modernworkplace.com

Office365.com

i “On the Pulse: Information Security Risk In American Business.” Stroz Friedberg. 2013.

https://www.strozfriedberg.com/wp-content uploads/2014/01/Stroz-Friedberg_On-the-Pulse_Information-Security-in-American-Business.pdf

ii Newman, Daniel. “2016: The State of Shadow IT.” Converge.xyz. February 9, 2016.

http://converge.xyz/2016-the-state-of-shadow-it

iii “Cloud Adoption Practices & Priorities Survey Report.” Cloud Security Alliance. January 2015.

https://downloads.cloudsecurityalliance.org/initiatives/surveys/capp/Cloud_Adoption_Practices_Priorities_Survey_Final.pdf

iv “Cloud Adoption and Risk Report Q4 2014.” Skyhigh. 2015.

https://uploads.skyhighnetworks.com/2015/03/Skyhigh-Cloud-Adoption-and-Risk-Report-Q4-2014-0315.pdf

v “Remote Collaborative Worker Survey.” ConnectSolutions. February 17, 2015.

http://connectsolutions.com/press-release/connectsolutions-survey-shows-working-remotely-benefits-employers-and-employees

vi Fogarty, Kevin. “5 Things You Need to Know about BYO Tech.” CIO.com. December 16, 2010.

http://www.cio.com/article/2412612/virtualization/5-things-you-need-to-know-about-byo-tech.html

vii Newman, Daniel. “2016: The State of Shadow IT.” Converge.xyz. February 9, 2016.

http://converge.xyz/2016-the-state-of-shadow-it

viii “The Hidden Truth Behind Shadow IT: Six Trends Impacting Your Security Posture.” Frost & Sullivan. November 2013.

http://www.mcafee.com/us/resources/reports/rp-six-trends-security.pdf

ix Starke, Joann. “The Shadow IT Dilemma.” Cisco Blogs. March 23, 2016.

http://blogs.cisco.com/cloud/the-shadow-it-dilemma

You might also like