{"version":"1.0","provider_name":"","provider_url":"https:\/\/easexpense.com\/blogs","author_name":"kaustubh Rai","author_url":"https:\/\/easexpense.com\/blogs\/author\/kaustubheasenode-com\/","title":"Shadow IT: Recognizing and Managing Unauthorized Cloud Tools -","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Et1m4dYdyl\"><a href=\"https:\/\/easexpense.com\/blogs\/shadow-it-recognizing-and-managing-unauthorized-cloud-tools\/\">Shadow IT: Recognizing and Managing Unauthorized Cloud Tools<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/easexpense.com\/blogs\/shadow-it-recognizing-and-managing-unauthorized-cloud-tools\/embed\/#?secret=Et1m4dYdyl\" width=\"600\" height=\"338\" title=\"&#8220;Shadow IT: Recognizing and Managing Unauthorized Cloud Tools&#8221; &#8212; \" data-secret=\"Et1m4dYdyl\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/easexpense.com\/blogs\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/easexpense.com\/blogs\/wp-content\/uploads\/2024\/08\/easeblog.png","thumbnail_width":1097,"thumbnail_height":684,"description":"In today\u2019s digital landscape, cloud-based applications like Software as a Service (SaaS) are essential for enhancing business operations. However, alongside these benefits comes the risk of Shadow IT\u2014the use of unauthorized software and tools by employees without proper approval. This practice can expose organizations to significant security risks and compliance challenges. What is Shadow IT? [&hellip;]"}