The document discusses the growing issues of shadow IT and shadow data in organizations. It notes that employees are increasingly using unauthorized cloud services and mobile devices to store and access company data without IT approval. This poses security risks as employees may not follow proper security practices. The document recommends that organizations shift to adopt more flexible security strategies that empower employees while maintaining proper access controls, such as privilege management and monitoring. It also suggests improving security awareness training for staff.
Related topics: