5 warning signs that shadow IT lurks in your company
Here is a blog by our friend Joe Stangarone of mrc's Cup of Joe Blog. He writes about the dangers of shadow aka stealth IT and how to spot it. Shadow IT is basically software and services that enter your company network without your knowledge or permission. Here is his blog....
Summary: A growing trend, “Shadow IT” is a term used to describe IT systems and solutions built and/or used inside organizations without the approval of the IT department. This could include anything from employees emailing spreadsheets back and forth to entire departments licensing third-party, cloud solutions behind IT’s back. The problem: Since Shadow IT usually happens on the sneak, IT departments don’t know where (or how much) it’s happening. Is Shadow IT lurking in your business? Read this article to learn the warning signs.
Like it or not, Shadow IT is probably alive and well in your organization. Recent surveys find that it’s not only growing, it’s far more rampant than business leaders realize.
What can you do about it? In past articles, we’ve explored a few ways to address and reduce risks of Shadow IT. We’ve looked at:
- Ways to prevent Shadow IT.
- How to reduce security risks of Shadow IT.
- The benefits of embracing Shadow IT.
That being said, there’s still a problem: You can’t address Shadow IT if you can’t see it. How do you know whether or not Shadow IT lurks in your company?
We got your picture even without a microwave
his is a picture laden blog. There might even be a picture of you. We had our Open House on March 9th and I can’t be more proud. Kristian, Sara, Bernice and Teresa did a fantastic job promoting and organizing the event. The office looks great. We beat our attendance target. What surprised me the most was the energy at the event and how long people stayed to network, chat and learn about new stuff.
Here are some fun pictures. Some are a bit sentimental for me.
A sentimental photo, here we have Juan Lopez (a 20+ year veteran of Alvaka Networks), Yvonne Clemens (a 20+ year client of Alvaka Networks), and Rex Frank our first service manager and now an industry icon in what else… service management.
CRN’s story on the CIA Wikileaks leak
Partners Say Alleged CIA Hacking Papers Prompt 'Constant Vigilance' In Mobile Security In its news release on the so-called "Vault 7" documents, WikiLeaks describes a specialty CIA unit that develops malware to "infest, control and [...]
Alvaka Networks Open House Invitation
Orange County, CA - Alvaka Networks moves to larger headquarters in service expansion driven by security, DFARS/NIST 800-171 and IT uptime and performance management demands The 24x7 world of the internet is driving companies [...]
The latest trends in government contracting
Los Angeles, CA - 2017 is going to be highlighted as a banner year for some DoD related contractors, and a sad downturn for others. Why? DFARS 252.204-7012 is going to define new winners and [...]
How Top Tech Trends will affect your livelihood
Long Beach, CA - If you have not attended Adaptive Business Leaders annual presentation “Top Tech Trends” you should plan on it next January. This year was another stupendously insightful presentation on what we should [...]
I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Hello

