{"id":3068,"date":"2025-01-15T09:08:26","date_gmt":"2025-01-15T08:08:26","guid":{"rendered":"https:\/\/enthec.com\/?p=3068"},"modified":"2025-01-29T12:02:47","modified_gmt":"2025-01-29T11:02:47","slug":"the-meaning-of-shadow-it-in-corporate-cybersecurity","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/","title":{"rendered":"The Meaning of Shadow IT in Corporate Cybersecurity"},"content":{"rendered":"<p>When we talk about business cybersecurity, we can find concepts that, although they may seem complex, are essential to understanding today&#8217;s challenges. One of them is <strong>Shadow IT.<\/strong> But what exactly is it, and why should you care as a company manager?<br \/>In this article, we&#8217;ll explain this scenario and show you how to manage it to <strong>protect your organization.<\/strong>  <\/p>\n<p>&nbsp;<\/p>\n<h2>What is Shadow IT?<\/h2>\n<p>Shadow IT refers to using applications, devices, services, or computer systems within an organization that the Information Technology (IT) department has not approved or monitored. While it may not sound serious, this phenomenon poses <strong>significant data security and control risks.<\/strong><br \/>Simply put, Shadow IT appears when employees adopt external tools, whether to increase their productivity, facilitate teamwork, or fix immediate problems. However, because these solutions are not regulated or aligned with company policies, they <strong>can become an open door for cyberattacks<\/strong> or <a href=\"https:\/\/enthec.com\/en\/keys-to-preventing-data-leaks\/\">data leaks.<\/a> <\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-3061 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it.jpg\" alt=\"Shadow IT\" width=\"600\" height=\"400\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it.jpg 600w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it-300x200.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it-350x233.jpg 350w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Shadow IT: meaning in the business context<\/h2>\n<p>When we discuss Shadow IT and its meaning in the business environment, we are not only discussing unauthorized technological tools. Its impact is more profound, as it affects an organization&#8217;s ability to <strong>maintain centralized control over its infrastructure and the sensitive data it handles.<\/strong><br \/>A <strong>typical example<\/strong> is a sales team using a free cloud storage application to share documents. While you intend to improve collaboration, you could risk sensitive customer data, as those platforms may lack robust security measures. <\/p>\n<p>&nbsp;<\/p>\n<h2>Examples of Shadow IT in companies<\/h2>\n<p>To better understand the scope of this phenomenon, here are some <strong>common examples of Shadow IT:<\/strong><\/p>\n<ul>\n<li><strong>Unauthorized messaging apps:<\/strong> Employees who use WhatsApp or Telegram to share corporate information instead of secure tools provided by the company.<\/li>\n<li><strong>Cloud storage services: <\/strong>Platforms like Google Drive or Dropbox used without IT approval.<\/li>\n<li><strong>Project management software:<\/strong> Tools like Trello or Asana that some teams adopt without consulting the technology team.<\/li>\n<li><strong>Unregistered hardware:<\/strong> personal devices (mobiles, laptops or tablets) connected to the corporate network without adequate security.<\/li>\n<\/ul>\n<p>These examples show how shadow IT arises from employees&#8217; need to <strong>resolve issues quickly without considering the long-term implications for the company&#8217;s security.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>The risks of Shadow IT in cybersecurity<\/h2>\n<p>Shadow IT may seem harmless, but its<strong> risks are real and varied:<\/strong><\/p>\n<ul>\n<li><strong>Exposure to cyberattacks:<\/strong> Unsupervised applications can contain vulnerabilities that attackers exploit to access the enterprise network.<\/li>\n<li><strong>Lack of regulatory compliance: <\/strong>Many industries have strict regulations on data management. If an unauthorized tool stores sensitive data, it could result in fines or penalties. <\/li>\n<li><strong>Data fragmentation: <\/strong>information dispersed across multiple applications makes it difficult to manage and protect.<\/li>\n<li><strong>Loss of visibility:<\/strong> IT loses control over which tools are used and where critical data is.<\/li>\n<li><strong>Data leakage risks:<\/strong> Employees could unintentionally share sensitive information through unsecured applications<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>How to prevent and manage Shadow IT?<\/h2>\n<p>The key to reducing the impact of shadow IT is not to ban its use entirely but to<strong>manage it proactively.<\/strong> Here are some effective strategies: <\/p>\n<ol>\n<li><strong>Encourage team communication:<\/strong> listen to employees&#8217; technology needs and offer secure, authoritative solutions that fit their daily work.<\/li>\n<li><strong>Set clear policies: <\/strong>Define rules about using apps and devices and explain the risks associated with shadow IT.<\/li>\n<li><strong>Invest in monitoring solutions:<\/strong> Use tools that provide visibility into the applications and devices connected to your network.<\/li>\n<li><strong>Educate employees: <\/strong>Organize cybersecurity training sessions for the team to understand how their actions affect the company&#8217;s security.<\/li>\n<li><strong>Adopt continuous management solutions:<\/strong> Ensure the company has technologies capable of continuously identifying and mitigating risks.<\/li>\n<\/ol>\n<p>You may be interested in\u2192 <a href=\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/\">Cybersecurity solutions that you should apply in your company.<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Kartos: the ultimate solution to manage Shadow IT<\/h2>\n<p>At Enthec, we understand that managing shadow IT is a key challenge to protect your organization. We&#8217;ve developed <a href=\"https:\/\/enthec.com\/en\/kartos\/\">Kartos<\/a>, a solution designed specifically for companies seeking a comprehensive approach to <strong>Continuous Threat Exposure Management (CTEM).<\/strong><br \/>With Kartos, you can: <\/p>\n<ul>\n<li><strong>Detect and identify data breaches caused by Shadow IT:<\/strong> our solution scours all Web layers to locate any corporate data leaks and detect the causative breach.<\/li>\n<li><strong>Monitor threats in real-time<\/strong>: Gain complete visibility into vulnerabilities caused by shadow IT in real-time.<\/li>\n<li><strong>Detect open gaps<\/strong>, including those caused by the use of Shadow IT<\/li>\n<li><strong>Reduce risk and protect business continuity proactively:<\/strong> Disable vulnerabilities before they are used to design an attack.<\/li>\n<\/ul>\n<p>If you are looking for a solution that detects threats and allows you to act proactively, <strong>Kartos is your best ally.<\/strong><br \/>Shadow IT may seem like a quick fix for everyday problems, but its impact on enterprise cybersecurity is undeniable. The good news is that, with the right tools and strategies, you can <strong>transform this challenge into an opportunity to improve your organization&#8217;s security and efficiency.<\/strong><br \/>At <a href=\"https:\/\/enthec.com\/en\/\">Enthec,<\/a> we&#8217;re committed to helping you manage your threat exposure continuously and effectively. <a href=\"https:\/\/enthec.com\/en\/contact\/\">Contact us<\/a> and discover everything Kartos can do for your company and take the <strong>next step towards more robust and reliable cybersecurity.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/enthec.com\/en\/contact\/\"><img decoding=\"async\" class=\"alignnone size-full wp-image-3062\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Banner-WEB.jpg\" alt=\"Contact\" width=\"1000\" height=\"200\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Banner-WEB.jpg 1000w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Banner-WEB-300x60.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Banner-WEB-768x154.jpg 768w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Banner-WEB-350x70.jpg 350w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we talk about business cybersecurity, we can find concepts that, although they may seem complex, are essential to understanding [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3065,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[38,24,32,33],"class_list":["post-3068","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-organizations","tag-cybersecurity","tag-kartos-en","tag-risks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 Shadow IT: risks and prevention - Enthec<\/title>\n<meta name=\"description\" content=\"From Enthec, we explain the meaning of Shadow IT, its main risks, and prevention through solutions such as Kartos \u27a1\ufe0f Here!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 Shadow IT: risks and prevention - Enthec\" \/>\n<meta property=\"og:description\" content=\"From Enthec, we explain the meaning of Shadow IT, its main risks, and prevention through solutions such as Kartos \u27a1\ufe0f Here!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-15T08:08:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-29T11:02:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it-ciberseguridad-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"The Meaning of Shadow IT in Corporate Cybersecurity\",\"datePublished\":\"2025-01-15T08:08:26+00:00\",\"dateModified\":\"2025-01-29T11:02:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/\"},\"wordCount\":828,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it-ciberseguridad-scaled.jpg\",\"keywords\":[\"Organizations\",\"Cybersecurity\",\"Kartos\",\"Risks\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/\",\"url\":\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/\",\"name\":\"\u25b7 Shadow IT: risks and prevention - Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it-ciberseguridad-scaled.jpg\",\"datePublished\":\"2025-01-15T08:08:26+00:00\",\"dateModified\":\"2025-01-29T11:02:47+00:00\",\"description\":\"From Enthec, we explain the meaning of Shadow IT, its main risks, and prevention through solutions such as Kartos \u27a1\ufe0f Here!\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it-ciberseguridad-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it-ciberseguridad-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"office desk with laptop smart phone and business office background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Meaning of Shadow IT in Corporate Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 Shadow IT: risks and prevention - Enthec","description":"From Enthec, we explain the meaning of Shadow IT, its main risks, and prevention through solutions such as Kartos \u27a1\ufe0f Here!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 Shadow IT: risks and prevention - Enthec","og_description":"From Enthec, we explain the meaning of Shadow IT, its main risks, and prevention through solutions such as Kartos \u27a1\ufe0f Here!","og_url":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-01-15T08:08:26+00:00","article_modified_time":"2025-01-29T11:02:47+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it-ciberseguridad-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"The Meaning of Shadow IT in Corporate Cybersecurity","datePublished":"2025-01-15T08:08:26+00:00","dateModified":"2025-01-29T11:02:47+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/"},"wordCount":828,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it-ciberseguridad-scaled.jpg","keywords":["Organizations","Cybersecurity","Kartos","Risks"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/","url":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/","name":"\u25b7 Shadow IT: risks and prevention - Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it-ciberseguridad-scaled.jpg","datePublished":"2025-01-15T08:08:26+00:00","dateModified":"2025-01-29T11:02:47+00:00","description":"From Enthec, we explain the meaning of Shadow IT, its main risks, and prevention through solutions such as Kartos \u27a1\ufe0f Here!","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it-ciberseguridad-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/shadow-it-ciberseguridad-scaled.jpg","width":2560,"height":1707,"caption":"office desk with laptop smart phone and business office background."},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/the-meaning-of-shadow-it-in-corporate-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"The Meaning of Shadow IT in Corporate Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=3068"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3068\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/3065"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=3068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=3068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=3068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}