Shadow IT often arises when approved software does not meet user requirements (Option D), leading employees to seek alternative solutions.
ISACA CISA Reference: IT governance frameworks stress the need for user-centric IT policies to mitigate shadow IT risks.
Risk Implication: Shadow IT introduces security vulnerabilities, compliance risks, and potential data breaches.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit