Too often there is little communication between those responsible for executing an agency’s mission and those who acquire, develop, deploy and manage the agency’s information technology. The result is that workers often do not get the IT they need.
The agency might have a state-of-the-art network, data centers and applications, all leveraging the latest technology; but if it doesn’t help the staff efficiently do the job at hand they will find ways to get around the authorized IT and introduce their own solutions. The result is unauthorized and often unmanaged applications that can introduce vulnerabilities into the enterprise.
Read more.