This document provides an IT audit report focusing on shadow IT systems, highlighting the risks and recommendations for improving information security within an organization. Key findings include the inappropriate use of company emails, the presence of rogue devices on corporate networks, and the utilization of unsanctioned software, which pose significant security threats. The report suggests implementing stricter policies, enhancing employee training, and conducting regular audits to mitigate these risks.
Related topics: