{"id":67961,"date":"2022-08-24T21:22:17","date_gmt":"2022-08-25T01:22:17","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=resource&p=67961"},"modified":"2024-01-08T11:43:15","modified_gmt":"2024-01-08T16:43:15","slug":"shadow-it-overview-for-msps","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/shadow-it-overview-for-msps","title":{"rendered":"The Ins and Outs of Shadow IT: An Overview for MSPs"},"content":{"rendered":"\n
When users take work into their own hands through the use of unauthorized devices or unapproved applications, shadow IT begins to run rampant. These unmanaged endpoints create more opportunities for bad actors to infiltrate and steal confidential company data \u2014 with no simple path to remediation in sight.<\/p>\n\n\n\n
Tune in for an MSP-focused discussion on what shadow IT is, the negative impact it can have, and how to prevent it in your clients\u2019 businesses. We\u2019ll cover the high-level information MSPs should know about the topic and finish with actionable, easy-to-implement steps for preventing and protecting against shadow IT with JumpCloud and Augmentt.<\/p>\n","protected":false},"excerpt":{"rendered":"
When users take work into their own hands through the use of unauthorized devices or unapproved applications, shadow IT begins […]<\/p>\n","protected":false},"author":116,"featured_media":67962,"template":"page-templates\/webinar-page.php","categories":[2782],"collection":[],"wheel_hubs":[2335],"platform":[],"resource_type":[2336],"funnel_stage":[],"coauthors":[2553],"acf":[],"yoast_head":"\n