{"id":6222,"date":"2021-01-21T10:40:21","date_gmt":"2021-01-21T09:40:21","guid":{"rendered":"https:\/\/nboldapp.com\/?p=6222"},"modified":"2021-04-08T11:45:07","modified_gmt":"2021-04-08T10:45:07","slug":"5-tips-for-crushing-shadow-it","status":"publish","type":"post","link":"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/","title":{"rendered":"5 conseils pour \u00e9craser le \"Shadow IT\" (informatique fant\u00f4me)"},"content":{"rendered":"<p>Nowadays, shadow IT is one of the most common challenges in organizations, one that keeps IT specialists awake at night. The advent of new digital solutions and cloud services means that employees are using more technologies that are not authorized by the IT department. Oftentimes your staff don\u2019t even realize the risks these apps pose for the organization.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Today we will go through the main risks of shadow IT and share with you the strategies that will help you crush it.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-ub-table-of-contents-block ub_table-of-contents\" id=\"ub_table-of-contents-083c6aae-a203-4aed-a158-589841222bec\" data-linktodivider=\"false\" data-showtext=\"show\" data-hidetext=\"hide\" data-scrolltype=\"auto\" data-enablesmoothscroll=\"false\" data-initiallyhideonmobile=\"false\" data-initiallyshow=\"true\"><div class=\"ub_table-of-contents-header-container\" style=\"\">\n\t\t\t<div class=\"ub_table-of-contents-header\" style=\"text-align: left; \">\n\t\t\t\t<div class=\"ub_table-of-contents-title\">Table des mati\u00e8res<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div><div class=\"ub_table-of-contents-extra-container\" style=\"\">\n\t\t\t<div class=\"ub_table-of-contents-container ub_table-of-contents-1-column\">\n\t\t\t\t<ul style=\"\"><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/#0-risks-of-shadow-it\" style=\"\">Risks of shadow IT<\/a><ul><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/#1-data-loss\" style=\"\">Data loss<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/#2-conflicts-with-existing-software\" style=\"\">Conflicts with existing software<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/#3-compliance\" style=\"\">Compliance<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/#4-lack-of-security\" style=\"\">Lack of security<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/#5-loss-of-productivity\" style=\"\">Loss of productivity<\/a><\/li><\/ul><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/#6-strategies-that-will-help-you-crush-shadow-it\" style=\"\">Strategies that will help you crush shadow IT<\/a><ul><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/#7-1-determine-employees%E2%80%99-needs\" style=\"\">1. Determine employees\u2019 needs<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/#8-2-know-what-you%E2%80%99re-dealing-with\" style=\"\">2. Know what you\u2019re dealing with<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/#9-3-communicate-on-the-problem\" style=\"\">3. Communicate on the problem<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/#10-4-offer-an-app-suite-for-productivity-communication-and-collaboration\" style=\"\">4. Offer an app suite for productivity, communication and collaboration<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/#11-5-organize-change-management\" style=\"\">5. Organize change management<\/a><\/li><\/ul><\/li><\/ul>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" id=\"0-risks-of-shadow-it\">Risks of shadow IT<\/h2>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/tutorial-shadow-it\" target=\"_blank\" rel=\"noreferrer noopener\">Recent statistics<\/a> show that 80% of employees use unauthorized apps that no one has reviewed and that may not be compliant with your internal regulation policies. But why is it so dangerous?<\/p>\n\n\n\n<p>The use of shadow IT implies that unsanctioned software is not visible to the IT department. This creates major security risks stemming from the lost of control of organizations over their data.  Shadow IT may also lead to serious financial consequences for the organization. In fact, <a href=\"https:\/\/track.g2.com\/resources\/shadow-it-statistics#:~:text=A%20recent%20study%20from%20EMC,to%20shadow%20IT%20security%20breaches.\" target=\"_blank\" rel=\"noreferrer noopener\">studies suggest<\/a> that shadow IT security breaches cost organizations a total of $1.7 trillion each year.<\/p>\n\n\n\n<p>Below are some of the common risks of shadow IT:<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"1-data-loss\">Data loss<\/h3>\n\n\n\n<p>When an unknown app runs in your network there\u2019s always a possibility of losing important data. Chances are your IT department will not create a backup for a software they don\u2019t know exists. At the same time, the employees who use it will not think they need it. Therefore, if something occurs, you might lose valuable information with little chance to restore it.<\/p>\n\n\n\n<p>On top of that, you cannot control who gets access to sensitive data that is stored in an unapproved platform. This can lead to multiple problems, including leaks of confidential information.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"2-conflicts-with-existing-software\">Conflicts with existing software<\/h3>\n\n\n\n<p>Some elements of an unsanctioned software can be incompatible with the existing solution. As a result, your organization may experience performance inefficiencies and system failures.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"3-compliance\">Compliance<\/h3>\n\n\n\n<p>Most organizations have to comply with specific compliance regulations, laws, and industry standards. Using shadow IT violates these rules and can lead to large fines and legal issues as well as threaten companies&#8217; existence.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"4-lack-of-security\">Lack of security<\/h3>\n\n\n\n<p>If a malicious software is installed into your employee\u2019s mobile device that\u2019s connected to enterprise network, it can pose a major data security risk. There\u2019s a chance the software will be granted all the permissions to access the data on their mobile device.<\/p>\n\n\n\n<p>As a result, the system becomes more susceptible to hacker attacks, phishing and ransomware. Additionally, since unsanctioned apps are not managed by the IT department, they may contain errors and vulnerabilities.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"5-loss-of-productivity\">Loss of productivity<\/h3>\n\n\n\n<p>This might seem counter logical, since the reason why people resort to shadow IT is to facilitate their work. However, it can deliver completely opposite results.<\/p>\n\n\n\n<p>When users rely on different apps for collaboration, it may cause more harm than good. If different teams need to work on the same document while using different collaboration tools, the same document can be uploaded, edited and resent multiple times causing major time and productivity loss.<\/p>\n\n\n\n<p>Moreover, maneuvering through multiple apps makes you lose focus, taking its toll on productivity.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" id=\"6-strategies-that-will-help-you-crush-shadow-it\">Strategies that will help you crush shadow IT<\/h2>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"7-1-determine-employees%E2%80%99-needs\">1. Determine employees\u2019 needs<\/h3>\n\n\n\n<p>Before figuring out the ways to put an end to shadow IT you should understand why your employees decided to use unauthorized apps in the first place. Elimination of shadow IT should be done according to your users\u2019 needs for better functionality.<\/p>\n\n\n\n<p>Is the tool that the organization provides sufficient for your employees to do their job effectively? Is it easy to navigate? Do they know how to actually use it? Or maybe they simply prefer to use another solution out of habit and don\u2019t want to adapt to change?<\/p>\n\n\n\n<p>Answering these questions will help you determine employees\u2019 needs and the required strategy.<\/p>\n\n\n\n<p>Understanding this is the first step towards finding ways to address the needs of your staff with existing software.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"8-2-know-what-you%E2%80%99re-dealing-with\">2. Know what you\u2019re dealing with<\/h3>\n\n\n\n<p>The next step will be to track any unauthorized app or cloud service your employees are currently using.<\/p>\n\n\n\n<p>You can monitor your network and traffic from collaboration platforms. For example, if your company uses Microsoft 365, you can look for traffic from Google cloud, Slack, Dropbox, and other common platforms.<\/p>\n\n\n\n<p>Storing critical and sensitive company data in unauthorized cloud services creates major security risks for the company, giving access to important information to literally anyone.<\/p>\n\n\n\n<p>You can use <a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/what-is-cloud-app-security\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud App Security<\/a> to control data travel in your company. It connects with organization\u2019s networks and analyzes traffic. This way you can identify users or departments that use unapproved apps.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"9-3-communicate-on-the-problem\">3. Communicate on the problem<\/h3>\n\n\n\n<p>Some of your employees might not even be aware that the use of certain apps and software is prohibited. When you establish which teams resort to unauthorized applications, you may want to communicate with them to understand the reasons behind their use of shadow IT. Mention its risks and offer solutions according to their needs.<\/p>\n\n\n\n<p>It is also important to inform managers of specific departments that their teams use shadow IT, offer solutions to combat it and take joint action.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"10-4-offer-an-app-suite-for-productivity-communication-and-collaboration\">4. Offer an app suite for productivity, communication and collaboration<\/h3>\n\n\n\n<p>Providing your staff with all the tools they need for efficient work is a key strategy for preventing shadow IT.<\/p>\n\n\n\n<p>When your employees have a platform that allows them to communicate both internally and externally via calls and instant messages, store information and collaborate on documents with their colleagues, as well as integrate any app required for their work \u2013 they get a tool that eliminates the need to use any other software.<\/p>\n\n\n\n<p>Microsoft Teams as a hub for communication and collaboration together with other Microsoft apps included into Office 365 suite provides just that. And its seamless integration with Microsoft and third-party apps offers a great user experience, eliminating the need to juggle multiple apps.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"199\" src=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/Office-365-suite-1024x199.png\" alt=\"Office 365 suite\" class=\"wp-image-6223\" srcset=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/Office-365-suite-1024x199.png 1024w, https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/Office-365-suite-300x58.png 300w, https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/Office-365-suite-768x149.png 768w, https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/Office-365-suite.png 1415w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>There\u2019s many reasons why you should use Teams for your business; we outlined 10 of them in <a href=\"https:\/\/nboldapp.com\/fr\/10-reasons-why-microsoft-teams-is-right-for-your-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">cet article<\/a>.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"11-5-organize-change-management\">5. Organize change management<\/h3>\n\n\n\n<p>Simply providing the staff with the right tools is not enough. Before changing the way your organization works, you may want to organize the entire change management strategy. You need to prepare your employees for the adoption and offer continuous support. This way you can ensure you and your employees are on the same page. <\/p>\n\n\n\n<p>Change management is a complex process that requires taking a series of steps.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"12-a-vision-\"><em>a. Vision<\/em><\/h4>\n\n\n\n<p>You will need to formulate your project\u2019s <a href=\"https:\/\/nboldapp.com\/fr\/vision-et-soutien-de-la-direction-pour-ladoption-de-microsoft-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">vision<\/a> explaining why there\u2019s a need for this change and how the company&#8217;s objectives are related to the adoption of a new digital tool.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"13-b-executive-sponsorship-\"><em>b. Executive sponsorship<\/em><\/h4>\n\n\n\n<p>In order to ensure cross-organizational buy-in you will also want to win support from the senior management and establish <a href=\"https:\/\/nboldapp.com\/fr\/vision-et-soutien-de-la-direction-pour-ladoption-de-microsoft-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">executive sponsorship<\/a>. Securing support from top management provides authority and validation to the Adoption Strategy and influences the staff.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"14-c-governance-\"><em>c. Governance<\/em><\/h4>\n\n\n\n<p>Another important step is to set up the right <a href=\"https:\/\/nboldapp.com\/fr\/defining-governance-for-ms-teams-adoption-strategy\/\" target=\"_blank\" rel=\"noreferrer noopener\">gouvernance<\/a>. And it goes beyond configuring security settings and technicalities of the use of your digital collaboration tool. You need to make sure you have an effective system of Project Management, Executive and IT Governance that would be in charge of achieving success in different aspects of the transformation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/media\/overview_of_security_and_compliance_in_microsoft_teams_image1.png\" alt=\"\"\/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"15-d-use-cases-\"><em>d. Use cases<\/em><\/h4>\n\n\n\n<p>Identify <a href=\"https:\/\/nboldapp.com\/fr\/how-to-define-microsoft-teams-scenarios-use-cases-and-templates\/\" target=\"_blank\" rel=\"noreferrer noopener\">cas d'utilisation<\/a> and showcase how your employees can solve their collaboration issues with the current digital tools. This is a key step towards persuading users to stop resorting to shadow IT and experience the benefits that Teams is offering. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/marketing-3-1536x863.png\" alt=\"\"\/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"16-e-templates-\"><em>e. Templates<\/em><\/h4>\n\n\n\n<p>Your employees will stop resorting to shadow cloud apps once they see the benefits of using templates for collaboration. <a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-templates-everything-you-need-to-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mod\u00e8les Microsoft Teams<\/a> facilitate greatly the process of teams creation. They offer a much better user experience, and provide team members with all the necessary channels for communication and collaboration.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2020\/09\/2020-09-25-10_23_18-.png\" alt=\"\"\/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"17-f-kpis-\"><em>f. KPIs<\/em><\/h4>\n\n\n\n<p>Change management requires establishing and measuring <a href=\"https:\/\/www.salestim.com\/determining-microsoft-teams-kpis-analytics-reporting\/\" target=\"_blank\" rel=\"noreferrer noopener\">KPIs<\/a> to have a clear idea about what makes it successful. Additionally, your success criteria will allow you demonstrate risk on investment and risk on non-investment to the executives, ensuring their buy-in.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"18-g-communication-plan-\"><em>g. Communication plan<\/em><\/h4>\n\n\n\n<p>Creating awareness and communicating to employees about the deployment of a new collaboration tool is an indispensable part of your change management strategy. It will help you generate interest and stir up enthusiasm from employees. A detailed <a href=\"https:\/\/nboldapp.com\/fr\/communication-plan-for-microsoft-teams-adoption\/\" target=\"_blank\" rel=\"noreferrer noopener\">Plan de communication<\/a> will allow your users to understand how they can be productive and efficient with the current tool while demonstrating that you are on their side.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2020\/09\/RE3lmtu.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"19-h-training-\"><em>h. Training<\/em><\/h4>\n\n\n\n<p>Shadow IT can be avoided if your users know how to use your existing collaboration tool to the fullest. Offer continuous <a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-adoption-strategy-training-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">training<\/a> to make sure your employees are familiar with all the key capabilities of the tool. There are many different formats for training that you can choose from, making the process more engaging, and thus encouraging active participation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2020\/09\/Training-Plan.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"20-i-champions-\"><em>i. Champions<\/em><\/h4>\n\n\n\n<p>Peer learning is one of the best ways to learn, so you may want to leverage your <a href=\"https:\/\/nboldapp.com\/fr\/reseau-de-champions-des-equipes-de-microsoft\/\" target=\"_blank\" rel=\"noreferrer noopener\">Champions<\/a> to achieve that. Get your most active Teams users onboard for your Adoption Strategy. Encourage them to help their colleagues successfully work with Teams and prevent the use of shadow IT.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2020\/09\/Champions-Checklist--1086x1536.png\" alt=\"Microsoft Teams champions checklist\" width=\"462\" height=\"654\"\/><\/figure>\n\n\n\n<p><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-adoption-strategy\/\" target=\"_blank\" rel=\"noreferrer noopener\">En savoir plus<\/a><strong> <\/strong>about how to build a successful Microsoft Teams Adoption Strategy.<\/p>","protected":false},"excerpt":{"rendered":"<p>Microsoft Teams training plan<\/p>","protected":false},"author":2,"featured_media":6224,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[161],"tags":[167],"class_list":["post-6222","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-governance","tag-shadow-it"],"featured_image_src":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/partial-view-of-woman-typing-on-laptop-at-tabletop-CT7C73P-scaled.jpg","author_info":{"display_name":"Alexandre Cipriani","author_link":"https:\/\/nboldapp.com\/fr\/author\/acipriani\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Crush Shadow IT with These 5 Tips - SalesTim<\/title>\n<meta name=\"description\" content=\"In this article we will go through the main risks of shadow IT and share with you the strategies that will help you crush it\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Tips for Crushing Shadow IT\" \/>\n<meta property=\"og:description\" content=\"In this article we will go through the main risks of shadow IT and share with you the strategies that will help you crush it\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/\" \/>\n<meta property=\"og:site_name\" content=\"nBold\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-21T09:40:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-08T10:45:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/partial-view-of-woman-typing-on-laptop-at-tabletop-CT7C73P-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1384\" \/>\n\t<meta property=\"og:image:height\" content=\"924\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre Cipriani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nboldhq\" \/>\n<meta name=\"twitter:site\" content=\"@nboldhq\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre Cipriani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Crush Shadow IT with These 5 Tips - SalesTim","description":"In this article we will go through the main risks of shadow IT and share with you the strategies that will help you crush it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/","og_locale":"fr_FR","og_type":"article","og_title":"5 Tips for Crushing Shadow IT","og_description":"In this article we will go through the main risks of shadow IT and share with you the strategies that will help you crush it","og_url":"https:\/\/nboldapp.com\/fr\/5-tips-for-crushing-shadow-it\/","og_site_name":"nBold","article_published_time":"2021-01-21T09:40:21+00:00","article_modified_time":"2021-04-08T10:45:07+00:00","og_image":[{"width":1384,"height":924,"url":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/partial-view-of-woman-typing-on-laptop-at-tabletop-CT7C73P-scaled.jpg","type":"image\/jpeg"}],"author":"Alexandre Cipriani","twitter_card":"summary_large_image","twitter_creator":"@nboldhq","twitter_site":"@nboldhq","twitter_misc":{"\u00c9crit par":"Alexandre Cipriani","Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nboldapp.com\/5-tips-for-crushing-shadow-it\/#article","isPartOf":{"@id":"https:\/\/nboldapp.com\/5-tips-for-crushing-shadow-it\/"},"author":{"name":"Alexandre Cipriani","@id":"https:\/\/nboldapp.com\/#\/schema\/person\/1a692fc52f6b8879fc00501f21c4109c"},"headline":"5 Tips for Crushing Shadow IT","datePublished":"2021-01-21T09:40:21+00:00","dateModified":"2021-04-08T10:45:07+00:00","mainEntityOfPage":{"@id":"https:\/\/nboldapp.com\/5-tips-for-crushing-shadow-it\/"},"wordCount":1532,"publisher":{"@id":"https:\/\/nboldapp.com\/#organization"},"image":{"@id":"https:\/\/nboldapp.com\/5-tips-for-crushing-shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/partial-view-of-woman-typing-on-laptop-at-tabletop-CT7C73P-scaled.jpg","keywords":["shadow IT"],"articleSection":["Governance"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/nboldapp.com\/5-tips-for-crushing-shadow-it\/","url":"https:\/\/nboldapp.com\/5-tips-for-crushing-shadow-it\/","name":"Crush Shadow IT with These 5 Tips - SalesTim","isPartOf":{"@id":"https:\/\/nboldapp.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nboldapp.com\/5-tips-for-crushing-shadow-it\/#primaryimage"},"image":{"@id":"https:\/\/nboldapp.com\/5-tips-for-crushing-shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/partial-view-of-woman-typing-on-laptop-at-tabletop-CT7C73P-scaled.jpg","datePublished":"2021-01-21T09:40:21+00:00","dateModified":"2021-04-08T10:45:07+00:00","description":"In this article we will go through the main risks of shadow IT and share with you the strategies that will help you crush it","breadcrumb":{"@id":"https:\/\/nboldapp.com\/5-tips-for-crushing-shadow-it\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nboldapp.com\/5-tips-for-crushing-shadow-it\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nboldapp.com\/5-tips-for-crushing-shadow-it\/#primaryimage","url":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/partial-view-of-woman-typing-on-laptop-at-tabletop-CT7C73P-scaled.jpg","contentUrl":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/partial-view-of-woman-typing-on-laptop-at-tabletop-CT7C73P-scaled.jpg","width":1384,"height":924,"caption":"partial view of woman typing on laptop at tabletop with smartphone and notebook, cyber security"},{"@type":"BreadcrumbList","@id":"https:\/\/nboldapp.com\/5-tips-for-crushing-shadow-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nboldapp.com\/"},{"@type":"ListItem","position":2,"name":"5 Tips for Crushing Shadow IT"}]},{"@type":"WebSite","@id":"https:\/\/nboldapp.com\/#website","url":"https:\/\/nboldapp.com\/","name":"nBold","description":"The Collaboration Process Technology.","publisher":{"@id":"https:\/\/nboldapp.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nboldapp.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/nboldapp.com\/#organization","name":"nBold","url":"https:\/\/nboldapp.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nboldapp.com\/#\/schema\/logo\/image\/","url":"https:\/\/nboldapp.com\/wp-content\/uploads\/2022\/02\/Logo.svg","contentUrl":"https:\/\/nboldapp.com\/wp-content\/uploads\/2022\/02\/Logo.svg","width":74,"height":21,"caption":"nBold"},"image":{"@id":"https:\/\/nboldapp.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/nboldhq","https:\/\/www.linkedin.com\/company\/nboldhq"]},{"@type":"Person","@id":"https:\/\/nboldapp.com\/#\/schema\/person\/1a692fc52f6b8879fc00501f21c4109c","name":"Alexandre Cipriani","url":"https:\/\/nboldapp.com\/fr\/author\/acipriani\/"}]}},"_links":{"self":[{"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/posts\/6222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/comments?post=6222"}],"version-history":[{"count":0,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/posts\/6222\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/media\/6224"}],"wp:attachment":[{"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/media?parent=6222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/categories?post=6222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/tags?post=6222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}