![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News updated on 31/05/2024
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News updated on 29/05/2024
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News updated on 10/05/2024
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News posted on 26/03/2024
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News posted on 22/03/2024
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
News posted on 17/01/2024
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2023-11/Portada_shadowIT_v2.png)
Blog posted on 26/10/2023
The presence of Shadow IT, i.e., the unauthorized or unmanaged use of IT technologies and services by employees, poses challenges and risks of considerable magnitude.
The rapid adoption of personal devices and applications, as well as accessibility to cloud services, have increased the complexity of the security landscape. This situation poses a risk that can compromise the confidentiality and integrity of the organization's information.