• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: shadow it

Hybrid Work

Enabling Anywhere Operations: Is Your Enterprise IT Environment Ready?

November 2, 2021 Paul Deur Leave a Comment

We learned a lot in 2020, not least that business agility – and particularly IT agility – is vital for businesses to respond quickly to changing market requirements. As time rolled on and workers remained at home, applications such as Microsoft Teams and Zoom saw spikes in adoption and industry surveys conveyed increasing demand for […]

Read More

HP Poly

Report: 83% Of IT Professionals Say Remote Work, Security Straining IT Staff

As shadow IT increases, phishing attacks and other social engineering tricks are becoming more successful, HP Wolf Security report finds.

October 28, 2021 Zachary Comeau Leave a Comment

A new report from HP Wolf Security finds that shadow IT is increasing and security incidents are rising as remote and hybrid workers get more comfortable settling into their home offices while commuting to the office a few days week. According to the report, HP Wolf Security report: Out of Sight & Out of Mind, […]

Read More

CIOs hybrid work strategies, spending, cloud app spend, SaaS spend, State of IT Mind report

CIOs Are Switching Strategies Amid Hybrid Work Challenges

Nearly half of CIOs plan to make changes in their hybrid work processes by using more automation and relying less on institutional knowledge.

September 15, 2021 Alyssa Borelli Leave a Comment

Nearly half of CIOs plan to make changes in their hybrid work processes by using more automation and relying less on institutional knowledge.

Read More

Is the Great Resignation Increasing Cloud App Security Risks?

Departing employees, ahead of their departure, pose an increase in cloud app security risk as they upload files to personal apps.

July 28, 2021 Alyssa Borelli Leave a Comment

Departing employees, ahead of their departure, pose an increase in cloud app security risk as they upload files to personal apps.

Read More

As Privacy Hits a Critical Juncture, DataGrail Integrates with HubSpot to Help Joint Customers Protect People’s Privacy

July 23, 2021 TechDecisions Staff Leave a Comment

Privacy-centric brands, like Plume, use the joint solution to make privacy a core brand pillar, and build trust with their customers SAN FRANCISCO–(BUSINESS WIRE)–#CCPA—DataGrail, the modern privacy platform designed to help brands build customer trust and transparency, announced today that it has integrated with HubSpot to make it easier for companies to protect their customers’ […]

Read More

Remote Worker Disconnect

How to Solve the Disconnect Between IT Department, Remote Workers

Remote work is causing a divide between employees and the IT department, but software and collective tech decision-making can help.

November 17, 2020 Zachary Comeau Leave a Comment

If your team is working remotely, there’s a good chance that has led to a disconnect between the IT department and your end users. No longer under the watchful eyes of IT, end users aren’t reporting IT issues or asking the IT department for help, and they’re using applications that might not be approved for […]

Read More

Office 365, O365, governance hierarchy

Setting Up O365 as A Unique Layer In Your Governance Hierarchy

We explore gaps that your new O365 Governance Framework should address while acknowledging components covered by your existing governance hierarchy.

May 28, 2019 Jack Wilson Leave a Comment

The Microsoft Office 365 environment boasts a spectrum of components, some of which can be managed by your organization’s existing frameworks. However, other components of the O365 environment may require the development of a unique governance hierarchy framework. Organizations implement varying levels of governance hierarchy frameworks to align strategy, policies, and procedures. At the highest […]

Read More

Myths About the Cloud Perpetuate Among IT Pros

Is the old wive's tale that cloud solutions are less secure and more expensive fact or fiction?

December 25, 2016 Rich Freeman Leave a Comment

Large numbers of IT professionals continue to question cloud computing’s cost-effectiveness and security, according to a newly published research study by partner community and managed services tool provider Spiceworks Inc., of Austin, Texas. The survey found that 29 percent of IT workers in North America, Europe, the Middle East, and Africa believe that personal and […]

Read More

Cybersecurity and information or network protection. Future technology web services for business and internet project

CrowdStrike Cyber Armageddon: How Do Firms Now Build Resilience?

Post-Quantum's Anderson Cheng writes how the CrowdStrike chaos prompts IT leaders to rethink of cloud strategies.

September 13, 2024 Andersen Cheng Leave a Comment

Towards the end of July, a botched software update at cyber security firm CrowdStrike caused chaos around the world, crippling IT systems that we all relied on. The disruption spanned across sectors; flights were grounded, patients were unable to contact healthcare services and customers were unable to make card payments. The event illustrated two things: […]

Read More

Royal Ransomware

FBI, CISA Warn of Royal Ransomware Targeting Critical Infrastructure

Royal ransomware actors have been targeting manufacturing, communications, healthcare and education entities since September 2022, agencies say.

March 3, 2023 Zachary Comeau Leave a Comment

U.S. agencies are warning critical infrastructure organizations to be on the lookout for Royal ransomware, a financially motivated threat actor that has been targeted manufacturing, communications, healthcare and education entities since September 2022. In a joint advisory, the FBI and U.S. Cybersecurity and Infrastructure Security Agency say the Royal ransomware actors have compromised U.S. and […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Interim pages omitted …
  • Page 14
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.