Look back 20 years, when IT was responsible for sourcing, licensing configuring and managing all workplace technology. PCs were kept secure by locking them down so that only approved apps and features were available and Active Directory’s group policies allowed fine-grained control over PCs. The only software allowed was what IT provided and managed. Access to large parts of the web, including social media, was blocked and there was no expectation that users would be able to (or want to) use their PCs at work to access personal data, including private email accounts.
To read this article in full, please click here
(Insider Story)
Click here for original story, Shadow IT goes home: How to reduce the risk
Source: Computer World