{"id":2659,"date":"2019-09-02T11:59:52","date_gmt":"2019-09-02T02:59:52","guid":{"rendered":"https:\/\/labor-consultant.com\/?p=2659"},"modified":"2019-09-02T11:59:52","modified_gmt":"2019-09-02T02:59:52","slug":"the-risk-of-information-problems-in-shadow-it","status":"publish","type":"post","link":"https:\/\/labor-consultant.com\/ja\/2019\/09\/02\/the-risk-of-information-problems-in-shadow-it\/","title":{"rendered":"The risk of information problems in &#8220;Shadow IT&#8221;"},"content":{"rendered":"<p><img decoding=\"async\" class=\"wp-image-2657 alignright\" src=\"https:\/\/labor-consultant.com\/wp\/wp-content\/uploads\/2019\/09\/Work-From-Home-Post-Message.jpg\" alt=\"\" width=\"328\" height=\"291\" srcset=\"https:\/\/labor-consultant.com\/wp\/wp-content\/uploads\/2019\/09\/Work-From-Home-Post-Message-200x178.jpg 200w, https:\/\/labor-consultant.com\/wp\/wp-content\/uploads\/2019\/09\/Work-From-Home-Post-Message-300x266.jpg 300w, https:\/\/labor-consultant.com\/wp\/wp-content\/uploads\/2019\/09\/Work-From-Home-Post-Message-400x355.jpg 400w, https:\/\/labor-consultant.com\/wp\/wp-content\/uploads\/2019\/09\/Work-From-Home-Post-Message-600x533.jpg 600w, https:\/\/labor-consultant.com\/wp\/wp-content\/uploads\/2019\/09\/Work-From-Home-Post-Message-768x682.jpg 768w, https:\/\/labor-consultant.com\/wp\/wp-content\/uploads\/2019\/09\/Work-From-Home-Post-Message-800x710.jpg 800w, https:\/\/labor-consultant.com\/wp\/wp-content\/uploads\/2019\/09\/Work-From-Home-Post-Message-1024x909.jpg 1024w, https:\/\/labor-consultant.com\/wp\/wp-content\/uploads\/2019\/09\/Work-From-Home-Post-Message-1200x1065.jpg 1200w, https:\/\/labor-consultant.com\/wp\/wp-content\/uploads\/2019\/09\/Work-From-Home-Post-Message.jpg 1600w\" sizes=\"(max-width: 328px) 100vw, 328px\" \/>\u25c6What is &#8220;Shadow IT?&#8221;<br \/>\nAs convenient IT tools emerge one after another, employees may use them for business purposes without their company&#8217;s knowledge. For example, using group chats to communicate with people outside of the company, using online storage services to exchange data, handling business data on a personal smartphone, storing take-home work on a USB device and going home with it, etc.<br \/>\nShadow IT is the unauthorized business use of external services and personal devices that are not permitted for use at work, which has become a problem due to the risk of information leakage.<\/p>\n<p>\u25c6Requires measures that differ from the &#8220;part-time job terrorism problem&#8221;<br \/>\nInappropriate social media posts by part-time employees have become known as the &#8220;part-time job terrorism&#8221; problem, and now, more companies are taking measures such as instructing employees to not behave inappropriately on the internet and social media.<br \/>\nHowever, because the risks of Shadow IT can be caused by using convenient services that improve business efficiency, it is fundamentally different from the problem of part-time job terrorism, and the problem cannot be solved simply by prohibiting employees from using these services.<\/p>\n<p>\u25c6First, investigate the usage and take measures<br \/>\nThe first step in dealing with the risks of Shadow IT is to investigate what types of services and devices are being used by employees, and to identify what IT tools are necessary for business.<br \/>\nFor services considered necessary for business, they must first clear the company&#8217;s security requirements,<\/p>\n<p>&nbsp;<\/p>\n<p>and then the company can specify the services approved for usage, establish the necessary IT environment, and prevent usage beyond those conditions.<br \/>\nThese measures may be time consuming and expensive, but they are necessary for the company to be able to understand and monitor usage of these services.<\/p>\n<p>\u25c6These measures are also necessary to increase productivity and diversify work styles<br \/>\nOpportunities are increasing to work in places other than offices because of diverse work styles and to improve productivity by promoting IT. These efforts lead to an easier way for employees to work, but they also bring about the risk of new information problems.<br \/>\nWhen dealing with &#8220;work style reform,&#8221; it is necessary to be cautious of Shadow IT risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u25c6What is &#8220;Shad  [&#8230;]<\/p>\n","protected":false},"author":1,"featured_media":2657,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[134],"class_list":["post-2659","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tokyo-hr-headlines-ja","tag-social-media-risk-ja"],"_links":{"self":[{"href":"https:\/\/labor-consultant.com\/ja\/wp-json\/wp\/v2\/posts\/2659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/labor-consultant.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/labor-consultant.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/labor-consultant.com\/ja\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/labor-consultant.com\/ja\/wp-json\/wp\/v2\/comments?post=2659"}],"version-history":[{"count":1,"href":"https:\/\/labor-consultant.com\/ja\/wp-json\/wp\/v2\/posts\/2659\/revisions"}],"predecessor-version":[{"id":2660,"href":"https:\/\/labor-consultant.com\/ja\/wp-json\/wp\/v2\/posts\/2659\/revisions\/2660"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/labor-consultant.com\/ja\/wp-json\/wp\/v2\/media\/2657"}],"wp:attachment":[{"href":"https:\/\/labor-consultant.com\/ja\/wp-json\/wp\/v2\/media?parent=2659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/labor-consultant.com\/ja\/wp-json\/wp\/v2\/categories?post=2659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/labor-consultant.com\/ja\/wp-json\/wp\/v2\/tags?post=2659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}