b'216-393-2484Q: Which game console did the U.S. Air Force use to build a supercomputer in 2010?A. Nintendo WiiB. XboxC. Xbox 360D. Playstation 3Answer on Page 2 SHADOW IT:JUNE 2025 How Employees Using Unauthorized Apps Could Be Putting Your Business At RiskThis monthlyYour employees might be the biggest cyber Employees using personal Google Drives or publication providedsecurity risk in your businessand not justDropbox accounts to store and share work courtesy of Trentbecause theyre prone to click phishing e-mailsdocuments.Milliron, CEO ofor reuse passwords. Its because theyre using apps Kloud9 IT. your IT team doesnt even know about.Teams signing up for unapproved project management tools like Trello, Asana or Slack This is called Shadow IT, and its one of thewithout IT oversight.fastest-growing security risks for businesses today. Employees download and use unauthorized apps, Workers installing messaging apps like OUR MISSION: software and cloud servicesoften wth goodWhatsApp or Telegram on company devices to intentionsbut in reality, theyre creating massivecommunicate outside of official channels.security vulnerabilities without even realizing it. Marketing teams using AI content generators or "Do It Right TheWhat Is Shadow IT? automation tools without verifying their security. Shadow IT refers to any technology used FirstTime" within a business that hasnt been approved, vetted or secured by the IT department. It can include things like: Continued on Page 2 .Technology That Works!216-393-24841'