During a routine audit, your security team has discovered an unauthorized active directory tool being used by the marketing department to synchronize contact information across platforms. The team suspects that this is a case of Shadow IT. What is the PRIMARY risk associated with this discovery?
Increased productivity and efficiency within the marketing department
Security breaches due to unauthorized applications bypassing organizational security processes
Decreased usage of IT-approved communication tools
Increased IT budget due to additional user licenses required for the unauthorized tool
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts