{"id":23215,"date":"2021-10-14T13:21:26","date_gmt":"2021-10-14T17:21:26","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=23215"},"modified":"2024-06-24T17:30:29","modified_gmt":"2024-06-24T21:30:29","slug":"dangers-of-shadow-it","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/","title":{"rendered":"The dangers of shadow IT"},"content":{"rendered":"<p>Unapproved apps, devices, and <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/managed-cloud\/\">cloud services<\/a> have long been the bane of IT professionals. <a href=\"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/\">Remote and hybrid work arrangements<\/a> that have grown in popularity during the <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/customer-acquisition-post-pandemic\/\">COVID-19 pandemic<\/a> have only made these \u201cshadow IT\u201d services more of a problem. But, just as hybrid work environments aren\u2019t going away any time soon, neither are the threats posed by shadow IT.<\/p>\n<p><strong>Are you worried about shadow IT in the environments you manage?<\/strong> Keep reading for everything you need to know about shadow IT, including what forms it can take, the specific risks it poses and different ways you can combat it.<\/p>\n<h3 style=\"text-align: center;\"><em><a class=\"track-link\" href=\"https:\/\/images.sherweb.com\/Documents\/sherweb-your-value-added-cloud-solutions-provider.pdf\">Grow your business with Sherweb<\/a><\/em><\/h3>\n<p>&nbsp;<\/p>\n<h2>Shadow IT is uncontrolled IT<\/h2>\n<p>Shadow IT is the shorthand term for all devices, applications, cloud services and other unauthorized technology used within an organization. If it connects to corporate IT resources, carries corporate data, or just sits on your corporate network beyond the control of your IT department or <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/how-to-start-an-msp-in-5-steps\/\">MSP<\/a>, then it counts as shadow IT.<\/p>\n<p>You may recognize this is a widespread problem, but one with a small impact. <strong>That is incorrect<\/strong>. Studies have shown that as much as <a href=\"https:\/\/www.forbes.com\/sites\/tomgroenfeldt\/2013\/12\/02\/40-percent-of-it-spending-is-outside-cio-control\">40%<\/a> of all corporate IT spending is on <a href=\"https:\/\/www.forbes.com\/sites\/insights-ibmresiliency\/2019\/08\/14\/shadow-it-you-cant-protect-what-you-cant-see\/\">shadow IT<\/a>\u2014purchases made for IT resources without the involvement or knowledge of the corporate IT department.<\/p>\n<p>In recent years, it has become such a problem that many companies are accelerating their <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/digital-transformation-mission-critical\/\">digital transformation<\/a> timetables to get ahead of it. The thinking is that if the entire IT environment <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/why-the-cloud-now\/\">moves to the cloud<\/a>, there\u2019s less space for on-premises shadow systems.<\/p>\n<p>While the only common trait among all shadow IT is that it is uncontrolled and unmanaged, in practice, MSPs usually see one of four main types of shadow systems.<\/p>\n<h3>Productivity apps and services<\/h3>\n<p>People like what&#8217;s familiar. Employees will often use personal accounts on their <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/productivity\/\">preferred productivity apps<\/a> at work because they\u2019re more comfortable with them than with approved corporate systems.<\/p>\n<h3>File storage<\/h3>\n<p>Similarly, employees often like using personal storage and file-sharing accounts to move work files quickly. In a recent survey conducted by G2, 83% of IT professionals reported that their employees stored company data on <a href=\"https:\/\/track.g2.com\/resources\/shadow-it-statistics\">unapproved cloud services<\/a>. They may see more secure, approved corporate services as too cumbersome or too confusing.<\/p>\n<h3>Messaging<\/h3>\n<p>Beyond file and app use, communication is the most common function for which employees use personal or shadow services. If they\u2019re connected to coworkers on a <a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/microsoft-teams\/\">personal messaging service<\/a>, then that communication probably isn\u2019t going to stick to purely personal topics. They may use those insecure channels to discuss company information.<\/p>\n<h3>Email<\/h3>\n<p>The majority of workers maintain both personal and work email accounts. If they have a personal email tab open on a work device, they may just find it easier to send a quick message from that rather than switching to approved and <a href=\"https:\/\/www.sherweb.com\/blog\/security\/back-up-email-data\/\">secured corporate email<\/a>.<\/p>\n<h2>Shadow IT poses many risks<\/h2>\n<h3>Security gaps<\/h3>\n<p>IT professionals do an excellent job of maintaining and updating corporate IT systems. End users on their own shadow IT services? Not so much. Shadow IT is at higher risk of causing <a href=\"https:\/\/www.sherweb.com\/blog\/security\/office-protect-alliance\/\">security breaches<\/a> and exposing corporate data. And if a compromised shadow service is connected to company resources, then a determined attacker will look to move laterally from that service to other more valuable corporate targets on your network.<\/p>\n<h3>Compliance concerns<\/h3>\n<p>Many regulatory standards require specific IT security and management levels; for example, <a href=\"https:\/\/www.cdc.gov\/phlp\/publications\/topic\/hipaa.html\">HIPAA<\/a> in healthcare and <a href=\"https:\/\/www.itgovernanceusa.com\/sarbanes-oxley\">Sarbanes-Oxley<\/a> in finance. As a result, if your users knowingly or unknowingly move protected data to shadow IT services, your company could become exposed to steep fines and other penalties.<\/p>\n<h3>Inefficiencies<\/h3>\n<p>Users often turn to shadow IT under the misguided notion that it will make them more efficient. Instead, it creates inefficiencies for the company as a whole, which will inevitably come back to hurt their productivity. For example, a data breach might require many staff to take on extra work during remediation. Additionally, paying out unexpected regulatory fines can eat into future budgets.<\/p>\n<h3>Reduced visibility and control<\/h3>\n<p>If you don\u2019t know which shadow IT services are used on your network, you can\u2019t formulate reliable strategic plans. The fundamental lack of visibility on which IT services are in use hurts your ability to properly manage your company\u2019s IT environment. You\u2019ll be left reactively jumping from crisis to crisis created by shadow service problems rather than proactively developing your IT program.<\/p>\n<h2>How to combat shadow IT<\/h2>\n<p>There are many steps you can take to prevent shadow IT from disrupting your IT environment.<\/p>\n<h3>Use discovery tools to find rogue services<\/h3>\n<p>Start addressing shadow IT by first addressing the lack of visibility and control that allowed it to take root in the first place. <a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/fight-shadow-it-office-365\/\">IT discovery tools<\/a> can help you identify which unauthorized devices and services are connected to company resources.<\/p>\n<h3>Implement ongoing network monitoring<\/h3>\n<p>Once you\u2019ve addressed the services already in use, you then need to make sure new ones aren\u2019t added to your company\u2019s IT environment. Various <a href=\"https:\/\/www.sherweb.com\/blog\/security\/how-to-set-up-security-after-assessing-vulnerabilities-with-office-protect\/\">network monitoring tools<\/a> can make you aware of recent, unexpected activity.<\/p>\n<h3>Introduce policies and procedures for acceptable software use<\/h3>\n<p>Create an acceptable use policy for information technology within your organization. That could mean the use of:<\/p>\n<ul>\n<li>Company devices<\/li>\n<li>Personal devices<\/li>\n<li>Third-party software<\/li>\n<li>Cloud services<\/li>\n<\/ul>\n<p>Your policy should explicitly state what kind of IT services are authorized and which are prohibited. Employees shouldn\u2019t be left guessing whether a popular cloud app should be used or not.<\/p>\n<p>Also, include an approval procedure in your acceptable use policy. Give employees a way to have popular third-party services evaluated and approved for company use.<\/p>\n<h3>Educate workers about shadow IT<\/h3>\n<p>Employees don\u2019t bring shadow IT assets into the workplace to harm the company. They\u2019re just trying to make their jobs easier, and they don\u2019t see the associated risks.<\/p>\n<p>Make shadow IT training part of your new hire orientation. Find ways to inform current employees through the company newsletter or add it to annual retraining sessions.<\/p>\n<p>Educate them on the risks created by shadow IT in the workplace and what the direct impact to them might be. For example, suppose an employee learns they\u2019ll need to take part in a lengthy remediation process after a data breach on top of their regular duties. In that case, they\u2019ll probably be much less likely to use high-risk shadow services.<\/p>\n<h3>Restrict third-party apps<\/h3>\n<p>If you\u2019re using a cloud-based platform like <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/productivity\/microsoft-365\/\">Microsoft 365<\/a>, you\u2019ll be able to <a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/tutorial-shadow-it\">restrict how third-party apps can interact with your IT assets<\/a>. For example, you can block known dangerous apps or flag others for monitoring. For example, is a flagged app suddenly receiving a high-volume data transfer? The Cloud App Security tool can send you an email or text notification so you can immediately evaluate.<\/p>\n<h3>Use the right cloud services<\/h3>\n<p>Remember, employees set up shadow IT either because they\u2019re more familiar with it or view company IT services as ineffective. Therefore, when possible, give your employees access to the <a href=\"https:\/\/www.sherweb.com\/productivity\/\">best possible IT services <\/a>so they don\u2019t feel like they have to go hunting for their own.<\/p>\n<h2>Get more IT best practices<\/h2>\n<p>Sherweb provides <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/partners\/\">partners<\/a> with a broad range of <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/partners\/support\/\">training resources and expertise<\/a> to help them grow their businesses. Join our <a href=\"https:\/\/cumulus.sherweb.com\/partners\/signup\/?Culture=en-US\">partner network<\/a> today or read our <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\">Partner Guide<\/a> to learn more.<\/p>\n<p><a class=\"cta-track\" href=\"https:\/\/www.sherweb.com\/partners\/resources-and-services\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22281 size-full\" src=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Business-strategy-V2-1800x450px-Customsize.jpg\" alt=\"Get help fighting shadow IT\" width=\"1800\" height=\"450\" srcset=\"\/blog\/wp-content\/uploads\/Business-strategy-V2-1800x450px-Customsize.jpg 1800w, \/blog\/wp-content\/uploads\/Business-strategy-V2-1800x450px-Customsize-300x75.jpg 300w, \/blog\/wp-content\/uploads\/Business-strategy-V2-1800x450px-Customsize-1024x256.jpg 1024w, \/blog\/wp-content\/uploads\/Business-strategy-V2-1800x450px-Customsize-768x192.jpg 768w, \/blog\/wp-content\/uploads\/Business-strategy-V2-1800x450px-Customsize-1536x384.jpg 1536w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unapproved apps, devices, and cloud services have long been the bane of IT professionals. Remote ","protected":false},"author":177,"featured_media":23216,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[919],"class_list":["post-23215","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The dangers of shadow IT | Sherweb<\/title>\n<meta name=\"description\" content=\"Worried about shadow IT in environments you manage? Here&#039;s everything you need to know, including different ways to combat it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The dangers of shadow IT | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Worried about shadow IT in environments you manage? Here&#039;s everything you need to know, including different ways to combat it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-14T17:21:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-24T21:30:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Dangers-of-Shadow-IT-1200x480@2x.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"The dangers of shadow IT\",\"datePublished\":\"2021-10-14T17:21:26+00:00\",\"dateModified\":\"2024-06-24T21:30:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/\"},\"wordCount\":1219,\"commentCount\":2,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Dangers-of-Shadow-IT-1200x480@2x.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/\",\"name\":\"The dangers of shadow IT | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Dangers-of-Shadow-IT-1200x480@2x.jpg\",\"datePublished\":\"2021-10-14T17:21:26+00:00\",\"dateModified\":\"2024-06-24T21:30:29+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Worried about shadow IT in environments you manage? Here's everything you need to know, including different ways to combat it.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Dangers-of-Shadow-IT-1200x480@2x.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Dangers-of-Shadow-IT-1200x480@2x.jpg\",\"width\":2400,\"height\":920,\"caption\":\"Dangers of Shadow IT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/dangers-of-shadow-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The dangers of shadow IT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The dangers of shadow IT | Sherweb","description":"Worried about shadow IT in environments you manage? Here's everything you need to know, including different ways to combat it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/","og_locale":"en_US","og_type":"article","og_title":"The dangers of shadow IT | Sherweb","og_description":"Worried about shadow IT in environments you manage? Here's everything you need to know, including different ways to combat it.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2021-10-14T17:21:26+00:00","article_modified_time":"2024-06-24T21:30:29+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Dangers-of-Shadow-IT-1200x480@2x.jpg","type":"image\/jpeg"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"The dangers of shadow IT","datePublished":"2021-10-14T17:21:26+00:00","dateModified":"2024-06-24T21:30:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/"},"wordCount":1219,"commentCount":2,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Dangers-of-Shadow-IT-1200x480@2x.jpg","keywords":["Cybersecurity"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/","url":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/","name":"The dangers of shadow IT | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Dangers-of-Shadow-IT-1200x480@2x.jpg","datePublished":"2021-10-14T17:21:26+00:00","dateModified":"2024-06-24T21:30:29+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Worried about shadow IT in environments you manage? Here's everything you need to know, including different ways to combat it.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Dangers-of-Shadow-IT-1200x480@2x.jpg","contentUrl":"\/blog\/wp-content\/uploads\/Dangers-of-Shadow-IT-1200x480@2x.jpg","width":2400,"height":920,"caption":"Dangers of Shadow IT"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"The dangers of shadow IT"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/23215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=23215"}],"version-history":[{"count":2,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/23215\/revisions"}],"predecessor-version":[{"id":24875,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/23215\/revisions\/24875"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/23216"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=23215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=23215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=23215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}