Shadow IT and Shadow Remote Access. How to Find It (for free!)


Posted on in Presentations

From the TeamViewer attack to the Nuance attack, we are just now beginning to see how often vendors have direct access to our networks. And many times, they never asked, it was just baked into the product or service they provide.

Participants
John Strand

Participant

Owner, BHIS


Share With Your Community