security breach

Contenido security breach

News updated on 01/05/2024
News updated on 25/04/2024
News updated on 05/04/2024
News posted on 08/04/2024
News posted on 04/04/2024
Blog posted on 26/10/2023

The presence  of Shadow IT, i.e., the unauthorized or unmanaged use of IT technologies and services by employees, poses challenges and risks of considerable magnitude.

The rapid adoption of personal devices and applications, as well as accessibility to cloud services, have increased the complexity of the security landscape. This situation poses a risk that can compromise the confidentiality and integrity of the organization's information.