Turn Shadow IT into Citizen Developers
When I was working in the trenches as an IT Admin, there were always one or two people who had little patience for waiting for IT to show up and knew just enough to be dangerous. Those are the types …
When I was working in the trenches as an IT Admin, there were always one or two people who had little patience for waiting for IT to show up and knew just enough to be dangerous. Those are the types …
It is challenging for IT and security admins to keep up with the rapid pace of change and the constant barrage of new threats and vulnerabilities to worry about. When users connect unknown mobile devices or log in to unauthorized …
I know from my days working in the IT trenches that there are always a few users–users who do not actually work in IT–who know just enough about technology to be dangerous. When users want (or need) something and IT …
There are a handful of users in any organization who don’t work in IT, but know enough to work around the system, circumvent policies, and get things done–sometimes risky things that put the organization at risk. With cloud services and …
Once upon a time, not so long ago, the IT admin chose exactly what hardware and software would be used by employees. Recent trends like the consumerization of IT and BYOD (bring your own device) have shifted the balance of …