Why does Shadow IT exist?
An organization’s security posture is actually set too high or is too complex for business operations to occur without be negatively affected
Shadow IT
Use of information technology systems, devices, software, and applications and services without explicit organizational approval
BYOD (Bring Your Own Device)
Involves the use of personal devices for work purposes