During a routine audit, your security team has discovered an unauthorized active directory tool being used by the marketing department to synchronize contact information across platforms. The team suspects that this is a case of Shadow IT. What is the PRIMARY risk associated with this discovery?
Increased productivity and efficiency within the marketing department
Increased IT budget due to additional user licenses required for the unauthorized tool
Security breaches due to unauthorized applications bypassing organizational security processes
Decreased usage of IT-approved communication tools
The primary risk associated with Shadow IT is the potential for security breaches due to the use of unauthorized applications or systems that have not been vetted by the organization's security protocols. These tools might not be compliant with the organization’s security policies, may not be regularly patched or updated, and could lead to the exposure of sensitive data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is Shadow IT?
Open an interactive chat with Bash
How can unauthorized applications lead to security breaches?
Open an interactive chat with Bash
What steps can organizations take to mitigate the risks associated with Shadow IT?