Shadow IT – as the name implies – is the installation and use of applications by employees that operate in an organisation’s area of shadows, without the knowledge or approval of IT. These applications have not been vetted, authorised, controlled or supported by the IT team and therefore are often not in line with the organisation’s requirements for data management, security and compliance. At the same time, shadow IT is considered by many as an important source for innovation, enabling the faster development of applications and tools not considered by the IT team, to develop a prototype way of working…
Author: Ed Macnair
Terrorism has never been the most uplifting topic to talk about and perhaps that’s always been part of the problem. Collectively we need to find ways of tackling subjects that we’d rather not discuss at parties or at work. If for no other reason because they’re allowed to thrive and flourish on the very fact that we’d rather just pretend they didn’t exist – until the very day Andrew Parker spoke up In September, Andrew Parker, the head of MI5, launched an unprecedented attack on social media companies, saying they have a “responsibility” to pass on intelligence of potential terrorism.…
The top secret recipe for Heinz Tomato Ketchup is thought to be known by only eight to ten people in the world; KFC’s original recipe chicken is seasoned with a secret blend of eleven herbs and spices that is held in a vault in its Louisville, Kentucky HQ; and the ingredients used by Coca Cola is a closely held trade secret known only to a few employees. Yet, it’s not just multinational behemoths that hold dear valuable intellectual property (IP). From large pharmaceutical organisations to small family-run businesses, all now operate with business critical IP at the core of their…