How to use Shadow IT to your advantage

How to use Shadow IT to your advantage

The first response to Shadow IT of many organisations is to put an end to it – or try to. Understandable, seen it poses a great risk for the organisation, but what if there’s a better way to deal with it? In this blog, I’ll tell you how you can use Shadow IT to your...
Complete guide to HelloID: SSO, IAM, IdP and more

Complete guide to HelloID: SSO, IAM, IdP and more

Employees. While they are extremely valuable and, in most cases, simply vital to an organisation, they do pose the biggest safety risk. Besides the security point of view, they take up most of the Service Desk’s time as well. Two things that may not seem connected,...