{"id":29381,"date":"2023-06-08T18:11:50","date_gmt":"2023-06-08T18:11:50","guid":{"rendered":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/?p=29381"},"modified":"2023-06-08T18:11:51","modified_gmt":"2023-06-08T18:11:51","slug":"what-is-shadow-it-why-do-you-have-to-know-about-it","status":"publish","type":"post","link":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/","title":{"rendered":"What Is Shadow IT &#038; Why Do You Have to Know About It?"},"content":{"rendered":"<p><\/p>\n<div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">The term <em>shadow IT<\/em> has garnered each praise as an efficient approach towards cloud-based productivity and criticism because the foremost security threat confronting modern businesses. Nevertheless, what exactly does it entail?<\/p>\n<\/div>\n<h2 id=\"h-introducing-shadow-it\" class=\"Heading__SHeading-sc-o0nhd6-0\">Introducing Shadow IT<\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">At its simplest, shadow IT refers back to the technique of using IT systems, devices, software, and services without IT department oversight and infrequently in opposition to the official IT policy. At its most intricate, shadow IT is the body of informal policies, practices, and workarounds that an office culture uses to get past their IT department.\u00a0<\/p>\n<\/div>\n<h3 id=\"h-how-shadow-it-works\" class=\"Heading__SHeading-sc-o0nhd6-0\">How Shadow IT Works<\/h3>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Within the best-case scenario, shadow IT practices could make employees more productive \u2013 they will just get on with their work while cutting unimportant corners. They will circumvent complicated security or approval procedures that may have them sitting on their hands or filling out forms explaining why they need something relatively than simply doing it. It evokes the nice parts of the startup mentality and the type of unregulated environments that gave rise to most of the best triumphs of the trendy age.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Nevertheless, most corporations and even moderately sized businesses attempt to eliminate these unregulated practices for very specific reasons. Circumventing policy all the time presents some risk \u2013 unless the policy really is unfit for purpose.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">n a way, you might say that an organization must completely rewrite its official IT policy when shadow IT practices are good for business. In the identical way, where shadow IT practices are literally more trouble than they&#8217;re value, your IT policy might be sound. The issue is available in the grey areas \u2013 as they all the time do. More often than not, things is not going to be so black and white, and it becomes a war of perspectives.\u00a0<\/p>\n<\/div>\n<h2 id=\"h-what-is-the-purpose-of-shadow-it-does-it-harm-your-business\" class=\"Heading__SHeading-sc-o0nhd6-0\">What Is the Purpose of Shadow IT? Does it Harm Your Business?\u00a0<\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">The aim of shadow IT is to chop corners. Most employees who will admit to using shadow IT say they accomplish that to be more efficient at their jobs. <a href=\"https:\/\/web.archive.org\/web\/20120211105302\/http:\/www.rsa.com\/company\/news\/releases\/pdfs\/RSA-insider-confessions.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">An RSA study<\/a> found that even 11 years ago, multiple in three employees believed they needed to work around company security policies to perform their roles to expectations.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Perhaps the approved, protected, secure file-sharing app underperforms in comparison with the most recent, shiniest, most-security-dubious file-sharing app. A few of your employees will start using the brand new app. If it causes immediate problems, IT will often step in and put a stop to that. If the brand new app really works well, then it may well slowly grow to be the system that everybody uses despite the policy. It has grow to be a part of that organization\u2019s shadow IT.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">When the vast majority of employees in a department are any combination of young, extremely smart, highly motivated to succeed, and\/or unwisely sure of their very own brilliance\u2026 well, the concept that rules are for other people can grow to be a part of the culture.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Can this type of culture harm your enterprise? Absolutely. Suppose that file-sharing app has a subtle flaw. It\u2019s not a trojan horse for hackers or anything, however it keeps a log of the traffic on a cloud server\u2026 somewhere.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Perhaps that server isn\u2019t thoroughly secured. Perhaps anyone who really desires to can access the whole lot your most tech-savvy employees message one another about. Suppose they will use that to hack your systems or disrupt your operations not directly.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Perhaps the IT department\u2019s insistence on using the boring, old, secure file-sharing app was the appropriate move.\u00a0<\/p>\n<\/div>\n<h2 id=\"h-exploring-the-advantages-of-shadow-it\" class=\"Heading__SHeading-sc-o0nhd6-0\">Exploring the Benefits of Shadow IT\u00a0\u00a0<\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Then again, sometimes cutting corners works out. Sometimes your people need a brand new solution to an issue instantly, and so they can\u2019t wait two weeks for IT to make your mind up if the provider is as protected as they claim. Sometimes the cowboy approach can get a prototype service up and running in a number of days and make a giant sale. You&#8217;ll be able to do all of the care and diligence later before it goes into production.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Sometimes the IT department really does have to step back and permit some corners to be cut, especially in non-critical areas. Even the perfect manager knows when to show a blind eye to a policy being circumvented.\u00a0<\/p>\n<\/div>\n<h2 id=\"h-the-risks-of-using-shadow-it-in-your-workplace\" class=\"Heading__SHeading-sc-o0nhd6-0\">The Risks of Using Shadow IT in Your Workplace\u00a0<\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Simply put, rules are there for a reason. Cutting corners exposes the corporate to risk. It may be a small risk which you can easily clean up. However it might be a really low likelihood of destroying the whole lot. If that happens, all anyone will need to know is why you didn&#8217;t implement the policy that might have prevented this disaster.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Most corporations wouldn\u2019t be blissful with employees deciding for themselves which risks were serious and which were trivial. That\u2019s why IT policies were invented in the primary place. You permit it to be circumvented at your peril.<\/p>\n<\/div>\n<h2 id=\"h-how-to-mitigate-the-risks-associated-with-shadow-it\" class=\"Heading__SHeading-sc-o0nhd6-0\">The right way to Mitigate the Risks Related to Shadow IT\u00a0<\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">The perfect method to enjoy a lot of the advantages of shadow IT without opening your organization as much as the worst of its risks is to be sure that the IT department has a light-weight hand. Not the velvet glove that hides the iron fist, but an <em>actual<\/em> light hand. In the event that they usually are not seen because the fun police, then your IT persons are more prone to be included in what your persons are actually doing.\u00a0<\/p>\n<\/div>\n<h2 id=\"h-wrapping-up\" class=\"Heading__SHeading-sc-o0nhd6-0\">Wrapping Up\u00a0<\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Shadow IT isn\u2019t all bad; it&#8217;s at its most dangerous when employees keep it a secret from IT. If the people you employed specifically because they will spot a dangerous IT risk rather more reliably than anyone else within the office get to see what is basically occurring, then they&#8217;re rather a lot more prone to have the opportunity to do their real job \u2013 stopping the really bad stuff \u2013 while allowing the actually harmless corner-cutting to proceed.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The term shadow IT has garnered each praise as an efficient approach towards cloud-based productivity and criticism because the foremost security threat confronting modern businesses. Nevertheless, what exactly does it entail? Introducing Shadow IT At its simplest, shadow IT refers back to the technique of using IT systems, devices, software, and services without IT department [&#8230;]\n","protected":false},"author":1,"featured_media":29382,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"fifu_image_url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2023\/06\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png","fifu_image_alt":"","two_page_speed":[],"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[97],"tags":[1001],"class_list":["post-29381","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-shadow"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is Shadow IT &amp; Why Do You Have to Know About It? - Daniels Marketing BLC<\/title>\n<meta name=\"description\" content=\"The term shadow IT has garnered each praise as an efficient approach towards cloud-based productivity and criticism because the foremost security threat\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Shadow IT &amp; Why Do You Have to Know About It? - Daniels Marketing BLC\" \/>\n<meta property=\"og:description\" content=\"The term shadow IT has garnered each praise as an efficient approach towards cloud-based productivity and criticism because the foremost security threat\" \/>\n<meta property=\"og:url\" content=\"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Daniels Marketing BLC\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-08T18:11:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-08T18:11:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2023\/06\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png\" \/>\n<meta name=\"author\" content=\"info\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2023\/06\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"info\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/\"},\"author\":{\"name\":\"info\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#\\\/schema\\\/person\\\/6a0a5d2e1a48d29297b62e635a4db33f\"},\"headline\":\"What Is Shadow IT &#038; Why Do You Have to Know About It?\",\"datePublished\":\"2023-06-08T18:11:50+00:00\",\"dateModified\":\"2023-06-08T18:11:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/\"},\"wordCount\":1012,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2023\\\/06\\\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png\",\"keywords\":[\"Shadow\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/\",\"url\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/\",\"name\":\"What Is Shadow IT & Why Do You Have to Know About It? - Daniels Marketing BLC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2023\\\/06\\\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png\",\"datePublished\":\"2023-06-08T18:11:50+00:00\",\"dateModified\":\"2023-06-08T18:11:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#\\\/schema\\\/person\\\/6a0a5d2e1a48d29297b62e635a4db33f\"},\"description\":\"The term shadow IT has garnered each praise as an efficient approach towards cloud-based productivity and criticism because the foremost security threat\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2023\\\/06\\\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png\",\"contentUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2023\\\/06\\\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/06\\\/08\\\/what-is-shadow-it-why-do-you-have-to-know-about-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Shadow IT &#038; Why Do You Have to Know About It?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#website\",\"url\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/\",\"name\":\"Daniels Marketing BLC\",\"description\":\"All About Health &amp; Marketing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#\\\/schema\\\/person\\\/6a0a5d2e1a48d29297b62e635a4db33f\",\"name\":\"info\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g\",\"caption\":\"info\"},\"url\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/author\\\/info\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Shadow IT & Why Do You Have to Know About It? - Daniels Marketing BLC","description":"The term shadow IT has garnered each praise as an efficient approach towards cloud-based productivity and criticism because the foremost security threat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/","og_locale":"en_US","og_type":"article","og_title":"What Is Shadow IT & Why Do You Have to Know About It? - Daniels Marketing BLC","og_description":"The term shadow IT has garnered each praise as an efficient approach towards cloud-based productivity and criticism because the foremost security threat","og_url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/","og_site_name":"Daniels Marketing BLC","article_published_time":"2023-06-08T18:11:50+00:00","article_modified_time":"2023-06-08T18:11:51+00:00","og_image":[{"url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2023\/06\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png","type":"","width":"","height":""}],"author":"info","twitter_card":"summary_large_image","twitter_image":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2023\/06\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png","twitter_misc":{"Written by":"info","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/#article","isPartOf":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/"},"author":{"name":"info","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#\/schema\/person\/6a0a5d2e1a48d29297b62e635a4db33f"},"headline":"What Is Shadow IT &#038; Why Do You Have to Know About It?","datePublished":"2023-06-08T18:11:50+00:00","dateModified":"2023-06-08T18:11:51+00:00","mainEntityOfPage":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/"},"wordCount":1012,"commentCount":0,"image":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2023\/06\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png","keywords":["Shadow"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/","url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/","name":"What Is Shadow IT & Why Do You Have to Know About It? - Daniels Marketing BLC","isPartOf":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#website"},"primaryImageOfPage":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/#primaryimage"},"image":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2023\/06\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png","datePublished":"2023-06-08T18:11:50+00:00","dateModified":"2023-06-08T18:11:51+00:00","author":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#\/schema\/person\/6a0a5d2e1a48d29297b62e635a4db33f"},"description":"The term shadow IT has garnered each praise as an efficient approach towards cloud-based productivity and criticism because the foremost security threat","breadcrumb":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/#primaryimage","url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2023\/06\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png","contentUrl":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2023\/06\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png"},{"@type":"BreadcrumbList","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/06\/08\/what-is-shadow-it-why-do-you-have-to-know-about-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/"},{"@type":"ListItem","position":2,"name":"What Is Shadow IT &#038; Why Do You Have to Know About It?"}]},{"@type":"WebSite","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#website","url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/","name":"Daniels Marketing BLC","description":"All About Health &amp; Marketing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#\/schema\/person\/6a0a5d2e1a48d29297b62e635a4db33f","name":"info","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g","caption":"info"},"url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/author\/info\/"}]}},"jetpack_featured_media_url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2023\/06\/What-Is-Shadow-IT-and-Why-Do-You-Need-to-Know-About-It-social-tile.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts\/29381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/comments?post=29381"}],"version-history":[{"count":2,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts\/29381\/revisions"}],"predecessor-version":[{"id":29384,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts\/29381\/revisions\/29384"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/media\/29382"}],"wp:attachment":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/media?parent=29381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/categories?post=29381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/tags?post=29381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}