How effectively does your organization manage shadow IT to mitigate security risks?

Very effectively (With strict policies and monitoring in place)27%

Moderately effectively (But improvements could be made)57%

Not effectively (As shadow IT is not actively addressed)16%

Not applicable (As shadow IT is not a concern in our organization)1%

83 PARTICIPANTS
996 viewscircle icon1 Comment
Sort by:
Director of IT in Education2 years ago

We use a CASB tool to identify all applications running in the organization.

Content you might like

We don't have an approved cyber resiliency strategy13%

We have an approved cyber resiliency strategy56%

We are executing our cyber resiliency strategy56%

We have a bunker site which will be used as a secure isolated recovery environment for recovery17%

We have cyber recovery capability12%

We have a secure isolated recovery environment13%

View Results