Settings
Language
Color Theme
What is Shadow IT?
Shadow IT is when employees use digital tools, applications or services such as cloud storage, messaging apps, or project software, without the approval or knowledge of their organization’s IT or security team.
Which of the following best describes shadow IT?
Shadow IT refers to employees using software, cloud services, or devices without getting approval from their organization’s IT or security team.
View Options Again
Software or services approved and managed by your organization's IT team
Use of tools, apps, or services without official approval from your organization’s IT or security team
A type of malware that hides within legitimate IT infrastructure
IT systems that operate only at night
An Example Of Shadow IT
You need a better way to manage customer feedback, so you sign up for a free survey platform without checking with IT. Everything works smoothly until you realize it's storing names, emails, and responses overseas. Sensitive customer data now sits in an overseas location, potentially putting your organization at risk.
Why Shadow IT Is A Problem
As seen in the prior example, Shadow IT can introduce serious risks. It creates security gaps, exposes sensitive data, can result in the violation of compliance or regulatory requirements. These issues often go unnoticed until it’s too late.
Which of the following is an example of Shadow IT?
Shadow IT happens when employees use unapproved apps, even with good intentions. In this case, a task management tool may help productivity, but without IT approval, it doesn't undergo a formal review, resulting in a weakened security posture and opening the door for potential data exposure, regulatory, or compliance-related risks.
View Options Again
A project management tool installed and maintained by the IT team
A secure internal portal managed by the IT team
A team member signing up for a task management tool without IT approval
A company email system approved by the IT team
Security Gaps
Unauthorized applications create blind spots. Without visibility, IT and security teams can't secure systems or detect weaknesses. This makes it easier for threats to go undetected and harder to respond when something goes wrong.
Data Exposure
Unvetted tools may misuse, mishandle, or even claim ownership of user data. When privacy policies are vague or hidden in fine print, sensitive information to be exposed, sold, or lost without the user realizing.
Why does Shadow IT create security gaps within an organization?
IT teams cannot protect what they do not know about. When employees use tools without approval, those tools bypass security checks, updates and monitoring. This creates hidden vulnerabilities that attackers can exploit, increasing the risk of a breach.
View Options Again
It automatically installs malware on devices
It prevents software from functioning correctly
It requires too many updates
IT teams can’t secure tools they don’t know exist
Compliance Violations
Using software or services that haven’t been formally approved can breach data privacy or sovereignty laws, especially if information is stored in regions with conflicting regulations. This puts the organization at risk of legal penalties, fines, or reputational damage, even if the user had no harmful intent.
What is one major compliance risk of using unapproved tools in the workplace?
When tools store data in regions with different legal protections, it can trigger compliance violations. Even if the user did it by accident, the organization may still face legal trouble, including audits, fines, or penalties.
View Options Again
They only work on certain devices
They may violate data privacy or sovereignty laws
They require too many user permissions
They are usually slower to load
What is the BIGGEST risk of using external apps or services without IT oversight?
Apps used without IT approval might include vague or predatory data policies, leading to accidental data exposure, misuse, or loss.
View Options Again
They require constant user updates
They limit file-sharing options
They slow down company devices
They may mishandle sensitive information or expose it to third parties
Is the following statement True or False:
Some apps include terms that give providers access to, or ownership of, your uploaded data.
Some apps and tools include hidden terms that allow the provider to access or even claim ownership of uploaded data. Without proper review, users may unknowingly expose sensitive information, increasing the risk of misuse or loss. This is why oversight and policy checks are essential before using new platforms.
View Options Again
True
False
How to Reduce Risk
Shadow IT might feel harmless, even helpful, but that convenience can come at a cost. Here are three simple steps to help you avoid putting your organization at risk.
Stay Aware
Follow The Rules
Speak Up
Understanding what Shadow IT is, and how it works, is your first defense. Knowing the risks helps you think twice before downloading tools that might create vulnerabilities for you or your organization.
Before using a new app or service for work, check your company’s policies. What seems helpful could open the door to serious security issues if it's not been thoroughly reviewed and approved.
If you find a tool that could boost your productivity, run it past your IT or security team. They’ll check if it’s safe and help roll it out the right way, so you get the benefits while minimizing the security risks.
You’ve found a new tool that could really improve your workflow. What should you do?
Always consult IT. They’ll assess the tool for security risks and ensure it’s implemented safely and in line with company policy.
View Options Again
Download it immediately and let your team know later
Quickly install it, use it, then uninstall it
Skip asking permission, an app can’t cause any damage
Run it past your IT team to ensure it’s safe for use
The Importance of Understanding Shadow-IT
Understanding Shadow IT helps you prevent security gaps, data leaks, and compliance issues. By staying aware, following policy, and involving IT, you reduce risk and strengthen your defenses. Make smart choices, stay secure, and help keep your organization safe.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Language translation for this training module has been disabled and explicitly set to the following language
[88, "Language translation for this training module has been disabled and explicitly set to the following language", "Language translation for this training module has been disabled and explicitly set to the following language"],
Shadow-IT
[89, "Shadow-IT", "Shadow-IT"],
What is Shadow IT?
[90, "What is Shadow IT?", "What is Shadow IT?"],
Shadow IT is when employees use digital tools, applications or services such as cloud storage, messaging apps, or project software, without the approval or knowledge of their organization’s IT or security team.
[91, "Shadow IT is when employees use digital tools, applications or services such as cloud storage, messaging apps, or project software, without the approval or knowledge of their organization’s IT or security team.", "Shadow IT is when employees use digital tools, applications or services such as cloud storage, messaging apps, or project software, without the approval or knowledge of their organization’s IT or security team."],
Which of the following best describes shadow IT?
[92, "Which of the following best describes shadow IT? ", "Which of the following best describes shadow IT? "],
IT systems that operate only at night
[93, "IT systems that operate only at night", "IT systems that operate only at night"],
Software or services approved and managed by your organization's IT team
[94, "Software or services approved and managed by your organization's IT team ", "Software or services approved and managed by your organization's IT team "],
Use of tools, apps, or services without official approval from your organization’s IT or security team
[95, "Use of tools, apps, or services without official approval from your organization’s IT or security team ", "Use of tools, apps, or services without official approval from your organization’s IT or security team "],
A type of malware that hides within legitimate IT infrastructure
[96, "A type of malware that hides within legitimate IT infrastructure", "A type of malware that hides within legitimate IT infrastructure"],
Shadow IT refers to employees using software, cloud services, or devices without getting approval from their organization’s IT or security team.
[97, "Shadow IT refers to employees using software, cloud services, or devices without getting approval from their organization’s IT or security team. ", "Shadow IT refers to employees using software, cloud services, or devices without getting approval from their organization’s IT or security team. "],
An Example Of Shadow IT
[98, "An Example Of Shadow IT", "An Example Of Shadow IT"],
You need a better way to manage customer feedback, so you sign up for a free survey platform without checking with IT. Everything works smoothly until you realize it's storing names, emails, and responses overseas. Sensitive customer data now sits in an overseas location, potentially putting your organization at risk.
[99, "You need a better way to manage customer feedback, so you sign up for a free survey platform without checking with IT. Everything works smoothly until you realize it's storing names, emails, and responses overseas. Sensitive customer data now sits in an overseas location, potentially putting your organization at risk. ", "You need a better way to manage customer feedback, so you sign up for a free survey platform without checking with IT. Everything works smoothly until you realize it's storing names, emails, and responses overseas. Sensitive customer data now sits in an overseas location, potentially putting your organization at risk. "],
Why Shadow IT Is A Problem
[100, "Why Shadow IT Is A Problem ", "Why Shadow IT Is A Problem "],
As seen in the prior example, Shadow IT can introduce serious risks. It creates security gaps, exposes sensitive data, can result in the violation of compliance or regulatory requirements. These issues often go unnoticed until it’s too late.
[101, "As seen in the prior example, Shadow IT can introduce serious risks. It creates security gaps, exposes sensitive data, can result in the violation of compliance or regulatory requirements. These issues often go unnoticed until it’s too late.", "As seen in the prior example, Shadow IT can introduce serious risks. It creates security gaps, exposes sensitive data, can result in the violation of compliance or regulatory requirements. These issues often go unnoticed until it’s too late."],
Which of the following is an example of Shadow IT?
[102, "Which of the following is an example of Shadow IT? ", "Which of the following is an example of Shadow IT? "],
A company email system approved by the IT team
[103, "A company email system approved by the IT team ", "A company email system approved by the IT team "],
A team member signing up for a task management tool without IT approval
[104, "A team member signing up for a task management tool without IT approval ", "A team member signing up for a task management tool without IT approval "],
A secure internal portal managed by the IT team
[105, "A secure internal portal managed by the IT team", "A secure internal portal managed by the IT team"],
A project management tool installed and maintained by the IT team
[106, "A project management tool installed and maintained by the IT team", "A project management tool installed and maintained by the IT team"],
Shadow IT happens when employees use unapproved apps, even with good intentions. In this case, a task management tool may help productivity, but without IT approval, it doesn't undergo a formal review, resulting in a weakened security posture and opening the door for potential data exposure, regulatory, or compliance-related risks.
[107, "Shadow IT happens when employees use unapproved apps, even with good intentions. In this case, a task management tool may help productivity, but without IT approval, it doesn't undergo a formal review, resulting in a weakened security posture and opening the door for potential data exposure, regulatory, or compliance-related risks. ", "Shadow IT happens when employees use unapproved apps, even with good intentions. In this case, a task management tool may help productivity, but without IT approval, it doesn't undergo a formal review, resulting in a weakened security posture and opening the door for potential data exposure, regulatory, or compliance-related risks. "],
Security Gaps
[108, "Security Gaps", "Security Gaps"],
Unauthorized applications create blind spots. Without visibility, IT and security teams can't secure systems or detect weaknesses. This makes it easier for threats to go undetected and harder to respond when something goes wrong.
[109, "Unauthorized applications create blind spots. Without visibility, IT and security teams can't secure systems or detect weaknesses. This makes it easier for threats to go undetected and harder to respond when something goes wrong. ", "Unauthorized applications create blind spots. Without visibility, IT and security teams can't secure systems or detect weaknesses. This makes it easier for threats to go undetected and harder to respond when something goes wrong. "],
Data Exposure
[110, "Data Exposure ", "Data Exposure "],
Unvetted tools may misuse, mishandle, or even claim ownership of user data. When privacy policies are vague or hidden in fine print, sensitive information to be exposed, sold, or lost without the user realizing.
[111, "Unvetted tools may misuse, mishandle, or even claim ownership of user data. When privacy policies are vague or hidden in fine print, sensitive information to be exposed, sold, or lost without the user realizing.", "Unvetted tools may misuse, mishandle, or even claim ownership of user data. When privacy policies are vague or hidden in fine print, sensitive information to be exposed, sold, or lost without the user realizing."],
Why does Shadow IT create security gaps within an organization?
[112, "Why does Shadow IT create security gaps within an organization? ", "Why does Shadow IT create security gaps within an organization? "],
It automatically installs malware on devices
[113, "It automatically installs malware on devices ", "It automatically installs malware on devices "],
It prevents software from functioning correctly
[114, "It prevents software from functioning correctly ", "It prevents software from functioning correctly "],
It requires too many updates
[115, "It requires too many updates ", "It requires too many updates "],
IT teams can’t secure tools they don’t know exist
[116, "IT teams can’t secure tools they don’t know exist", "IT teams can’t secure tools they don’t know exist"],
IT teams cannot protect what they do not know about. When employees use tools without approval, those tools bypass security checks, updates and monitoring. This creates hidden vulnerabilities that attackers can exploit, increasing the risk of a breach.
[117, "IT teams cannot protect what they do not know about. When employees use tools without approval, those tools bypass security checks, updates and monitoring. This creates hidden vulnerabilities that attackers can exploit, increasing the risk of a breach.", "IT teams cannot protect what they do not know about. When employees use tools without approval, those tools bypass security checks, updates and monitoring. This creates hidden vulnerabilities that attackers can exploit, increasing the risk of a breach."],
Compliance Violations
[118, "Compliance Violations", "Compliance Violations"],
Using software or services that haven’t been formally approved can breach data privacy or sovereignty laws, especially if information is stored in regions with conflicting regulations. This puts the organization at risk of legal penalties, fines, or reputational damage, even if the user had no harmful intent.
[119, "Using software or services that haven’t been formally approved can breach data privacy or sovereignty laws, especially if information is stored in regions with conflicting regulations. This puts the organization at risk of legal penalties, fines, or reputational damage, even if the user had no harmful intent.", "Using software or services that haven’t been formally approved can breach data privacy or sovereignty laws, especially if information is stored in regions with conflicting regulations. This puts the organization at risk of legal penalties, fines, or reputational damage, even if the user had no harmful intent."],
What is one major compliance risk of using unapproved tools in the workplace?
[120, "What is one major compliance risk of using unapproved tools in the workplace? ", "What is one major compliance risk of using unapproved tools in the workplace? "],
They may violate data privacy or sovereignty laws
[121, "They may violate data privacy or sovereignty laws ", "They may violate data privacy or sovereignty laws "],
They are usually slower to load
[122, "They are usually slower to load", "They are usually slower to load"],
They require too many user permissions
[123, "They require too many user permissions ", "They require too many user permissions "],
They only work on certain devices
[124, "They only work on certain devices", "They only work on certain devices"],
When tools store data in regions with different legal protections, it can trigger compliance violations. Even if the user did it by accident, the organization may still face legal trouble, including audits, fines, or penalties.
[125, "When tools store data in regions with different legal protections, it can trigger compliance violations. Even if the user did it by accident, the organization may still face legal trouble, including audits, fines, or penalties.", "When tools store data in regions with different legal protections, it can trigger compliance violations. Even if the user did it by accident, the organization may still face legal trouble, including audits, fines, or penalties."],
What is the BIGGEST risk of using external apps or services without IT oversight?
[126, "What is the BIGGEST risk of using external apps or services without IT oversight?", "What is the BIGGEST risk of using external apps or services without IT oversight?"],
They require constant user updates
[127, "They require constant user updates ", "They require constant user updates "],
They may mishandle sensitive information or expose it to third parties
[128, "They may mishandle sensitive information or expose it to third parties ", "They may mishandle sensitive information or expose it to third parties "],
They slow down company devices
[129, "They slow down company devices ", "They slow down company devices "],
They limit file-sharing options
[130, "They limit file-sharing options", "They limit file-sharing options"],
Apps used without IT approval might include vague or predatory data policies, leading to accidental data exposure, misuse, or loss.
[131, "Apps used without IT approval might include vague or predatory data policies, leading to accidental data exposure, misuse, or loss.", "Apps used without IT approval might include vague or predatory data policies, leading to accidental data exposure, misuse, or loss."],
Some apps include terms that give providers access to, or ownership of, your uploaded data.
[132, "Some apps include terms that give providers access to, or ownership of, your uploaded data.", "Some apps include terms that give providers access to, or ownership of, your uploaded data."],
Some apps and tools include hidden terms that allow the provider to access or even claim ownership of uploaded data. Without proper review, users may unknowingly expose sensitive information, increasing the risk of misuse or loss. This is why oversight and policy checks are essential before using new platforms.
[133, "Some apps and tools include hidden terms that allow the provider to access or even claim ownership of uploaded data. Without proper review, users may unknowingly expose sensitive information, increasing the risk of misuse or loss. This is why oversight and policy checks are essential before using new platforms.", "Some apps and tools include hidden terms that allow the provider to access or even claim ownership of uploaded data. Without proper review, users may unknowingly expose sensitive information, increasing the risk of misuse or loss. This is why oversight and policy checks are essential before using new platforms."],
How to Reduce Risk
[134, "How to Reduce Risk", "How to Reduce Risk"],
Shadow IT might feel harmless, even helpful, but that convenience can come at a cost. Here are three simple steps to help you avoid putting your organization at risk.
[135, "Shadow IT might feel harmless, even helpful, but that convenience can come at a cost. Here are three simple steps to help you avoid putting your organization at risk.", "Shadow IT might feel harmless, even helpful, but that convenience can come at a cost. Here are three simple steps to help you avoid putting your organization at risk."],
Stay Aware
[136, "Stay Aware", "Stay Aware"],
Understanding what Shadow IT is, and how it works, is your first defense. Knowing the risks helps you think twice before downloading tools that might create vulnerabilities for you or your organization.
[137, "Understanding what Shadow IT is, and how it works, is your first defense. Knowing the risks helps you think twice before downloading tools that might create vulnerabilities for you or your organization.", "Understanding what Shadow IT is, and how it works, is your first defense. Knowing the risks helps you think twice before downloading tools that might create vulnerabilities for you or your organization."],
Follow The Rules
[138, "Follow The Rules", "Follow The Rules"],
Before using a new app or service for work, check your company’s policies. What seems helpful could open the door to serious security issues if it's not been thoroughly reviewed and approved.
[139, "Before using a new app or service for work, check your company’s policies. What seems helpful could open the door to serious security issues if it's not been thoroughly reviewed and approved.", "Before using a new app or service for work, check your company’s policies. What seems helpful could open the door to serious security issues if it's not been thoroughly reviewed and approved."],
Speak Up
[140, "Speak Up", "Speak Up"],
If you find a tool that could boost your productivity, run it past your IT or security team. They’ll check if it’s safe and help roll it out the right way, so you get the benefits while minimizing the security risks.
[141, "If you find a tool that could boost your productivity, run it past your IT or security team. They’ll check if it’s safe and help roll it out the right way, so you get the benefits while minimizing the security risks.", "If you find a tool that could boost your productivity, run it past your IT or security team. They’ll check if it’s safe and help roll it out the right way, so you get the benefits while minimizing the security risks."],
You’ve found a new tool that could really improve your workflow. What should you do?
[142, "You’ve found a new tool that could really improve your workflow. What should you do? ", "You’ve found a new tool that could really improve your workflow. What should you do? "],
Download it immediately and let your team know later
[143, "Download it immediately and let your team know later", "Download it immediately and let your team know later"],
Skip asking permission, an app can’t cause any damage
[144, "Skip asking permission, an app can’t cause any damage ", "Skip asking permission, an app can’t cause any damage "],
Run it past your IT team to ensure it’s safe for use
[145, "Run it past your IT team to ensure it’s safe for use ", "Run it past your IT team to ensure it’s safe for use "],
Quickly install it, use it, then uninstall it
[146, "Quickly install it, use it, then uninstall it", "Quickly install it, use it, then uninstall it"],
Always consult IT. They’ll assess the tool for security risks and ensure it’s implemented safely and in line with company policy.
[147, "Always consult IT. They’ll assess the tool for security risks and ensure it’s implemented safely and in line with company policy.", "Always consult IT. They’ll assess the tool for security risks and ensure it’s implemented safely and in line with company policy."],
The Importance of Understanding Shadow-IT
[148, "The Importance of Understanding Shadow-IT", "The Importance of Understanding Shadow-IT"],
Understanding Shadow IT helps you prevent security gaps, data leaks, and compliance issues. By staying aware, following policy, and involving IT, you reduce risk and strengthen your defenses. Make smart choices, stay secure, and help keep your organization safe.
[149, "Understanding Shadow IT helps you prevent security gaps, data leaks, and compliance issues. By staying aware, following policy, and involving IT, you reduce risk and strengthen your defenses. Make smart choices, stay secure, and help keep your organization safe.", "Understanding Shadow IT helps you prevent security gaps, data leaks, and compliance issues. By staying aware, following policy, and involving IT, you reduce risk and strengthen your defenses. Make smart choices, stay secure, and help keep your organization safe."],
[150, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.