Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/32/d4/ae/32d4aeeb-6e80-c1b4-106f-d6567810fd0b/mza_17778578198876714620.png/600x600bb.jpg
Off the Wire: A Play by Play on Cybersecurity and Technology Issues
Anthony Kent & Tanner Greer
55 episodes
6 days ago
Show more...
Technology
Education,
Business,
Self-Improvement
RSS
All content for Off the Wire: A Play by Play on Cybersecurity and Technology Issues is the property of Anthony Kent & Tanner Greer and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Show more...
Technology
Education,
Business,
Self-Improvement
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/32/d4/ae/32d4aeeb-6e80-c1b4-106f-d6567810fd0b/mza_17778578198876714620.png/600x600bb.jpg
E38 – Stop Shadow IT with one easy trick!
Off the Wire: A Play by Play on Cybersecurity and Technology Issues
27 minutes 4 seconds
6 months ago
E38 – Stop Shadow IT with one easy trick!
Shadow IT: Identifying and Managing Unauthorized Technology Use In this episode of 'Off the Wire,' Tanner and Anthony discuss 'Shadow IT' and its implications on organizational security and efficiency. They delve into concrete examples, such as unauthorized software subscriptions and unapproved hardware purchases. Tanner and Anthony provide insights on why users engage in Shadow IT and the risks associated with it. They emphasize the importance of communication and understanding user needs to manage and potentially reduce Shadow IT. They also share practical tips and tools for identifying and mitigating the risks related to unauthorized technology use within an organization. 00:00 Introduction and Welcome 00:49 Understanding Shadow IT 01:36 Real-Life Examples of Shadow IT 03:20 Addressing Shadow IT Concerns 08:48 Risks and Security Implications 11:48 Tools and Strategies to Detect Shadow IT 15:59 Effective Communication and User Engagement 24:33 Final Thoughts and Conclusion
Off the Wire: A Play by Play on Cybersecurity and Technology Issues