{"id":30741,"date":"2022-10-31T06:00:00","date_gmt":"2022-10-31T13:00:00","guid":{"rendered":"https:\/\/insidebigdata.com\/?p=30741"},"modified":"2023-09-14T19:25:02","modified_gmt":"2023-09-15T02:25:02","slug":"infographic-shadow-data-creeps-in-the-silence","status":"publish","type":"post","link":"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/","title":{"rendered":"Infographic: Shadow Data Creeps in the Silence"},"content":{"rendered":"\n<p>While creatures of the night might fade away after Halloween\u2019s haunts on Monday, unknown or \u201cshadow\u201d data will remain lurking in the depths of organizations\u2019 networks. Shadow data stores are more likely to be misconfigured, unmonitored, and violate data security policies \u2014 making them easy targets.&nbsp;<\/p>\n\n\n\n<p>With 82% of security practitioners being concerned about shadow data, it\u2019s important to have the knowledge and tools to fight the fright all year long.&nbsp;<\/p>\n\n\n\n<p>The infographic below from our friends over at <a href=\"http:\/\/www.laminarsecurity.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Laminar<\/a> discuss:&nbsp;<\/p>\n\n\n\n<ul>\n<li>Common culprits of shadow data&nbsp;<\/li>\n\n\n\n<li>Shadow data threats&nbsp;<\/li>\n\n\n\n<li>How to shine a light on shadow data&nbsp;<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"700\" height=\"3091\" src=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/10\/Shadow_Data_Infographic_Laminar-1-2.png\" alt=\"\" class=\"wp-image-30745\" srcset=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/10\/Shadow_Data_Infographic_Laminar-1-2.png 700w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/10\/Shadow_Data_Infographic_Laminar-1-2-68x300.png 68w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/10\/Shadow_Data_Infographic_Laminar-1-2-232x1024.png 232w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/10\/Shadow_Data_Infographic_Laminar-1-2-34x150.png 34w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/10\/Shadow_Data_Infographic_Laminar-1-2-348x1536.png 348w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/10\/Shadow_Data_Infographic_Laminar-1-2-464x2048.png 464w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><em>Sign up for the free insideBIGDATA&nbsp;<a href=\"http:\/\/inside-bigdata.com\/newsletter\/\" target=\"_blank\" rel=\"noreferrer noopener\">newsletter<\/a>.<\/em><\/p>\n\n\n\n<p><em>Join us on Twitter:&nbsp;<a href=\"https:\/\/twitter.com\/InsideBigData1\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/InsideBigData1<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on LinkedIn:&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/insidebigdata\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.linkedin.com\/company\/insidebigdata\/<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on Facebook:&nbsp;<a href=\"https:\/\/www.facebook.com\/insideBIGDATANOW\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.facebook.com\/insideBIGDATANOW<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While creatures of the night might fade away after Halloween\u2019s haunts on Monday, unknown or \u201cshadow\u201d data will remain lurking in the depths of organizations\u2019 networks. Shadow data stores are more likely to be misconfigured, unmonitored, and violate data security policies \u2014 making them easy targets.\u00a0In the infographic below, our friends over at Laminar discuss how it\u2019s important to have the knowledge and tools to fight the fright all year long.\u00a0<\/p>\n","protected":false},"author":10513,"featured_media":30746,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[115,87,180,1304,56,1],"tags":[280,1226,1225,96],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Infographic: Shadow Data Creeps in the Silence - insideBIGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infographic: Shadow Data Creeps in the Silence - insideBIGDATA\" \/>\n<meta property=\"og:description\" content=\"While creatures of the night might fade away after Halloween\u2019s haunts on Monday, unknown or \u201cshadow\u201d data will remain lurking in the depths of organizations\u2019 networks. Shadow data stores are more likely to be misconfigured, unmonitored, and violate data security policies \u2014 making them easy targets.\u00a0In the infographic below, our friends over at Laminar discuss how it\u2019s important to have the knowledge and tools to fight the fright all year long.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/\" \/>\n<meta property=\"og:site_name\" content=\"insideBIGDATA\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/insidebigdata\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-31T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-15T02:25:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/10\/Halloween_shutterstock_1838683894_small.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"168\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:site\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/\",\"url\":\"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/\",\"name\":\"Infographic: Shadow Data Creeps in the Silence - insideBIGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/insidebigdata.com\/#website\"},\"datePublished\":\"2022-10-31T13:00:00+00:00\",\"dateModified\":\"2023-09-15T02:25:02+00:00\",\"author\":{\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\"},\"breadcrumb\":{\"@id\":\"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insidebigdata.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infographic: Shadow Data Creeps in the Silence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insidebigdata.com\/#website\",\"url\":\"https:\/\/insidebigdata.com\/\",\"name\":\"insideBIGDATA\",\"description\":\"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insidebigdata.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\",\"name\":\"Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"caption\":\"Editorial Team\"},\"sameAs\":[\"http:\/\/www.insidebigdata.com\"],\"url\":\"https:\/\/insidebigdata.com\/author\/editorial\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infographic: Shadow Data Creeps in the Silence - insideBIGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/","og_locale":"en_US","og_type":"article","og_title":"Infographic: Shadow Data Creeps in the Silence - insideBIGDATA","og_description":"While creatures of the night might fade away after Halloween\u2019s haunts on Monday, unknown or \u201cshadow\u201d data will remain lurking in the depths of organizations\u2019 networks. Shadow data stores are more likely to be misconfigured, unmonitored, and violate data security policies \u2014 making them easy targets.\u00a0In the infographic below, our friends over at Laminar discuss how it\u2019s important to have the knowledge and tools to fight the fright all year long.\u00a0","og_url":"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/","og_site_name":"insideBIGDATA","article_publisher":"http:\/\/www.facebook.com\/insidebigdata","article_published_time":"2022-10-31T13:00:00+00:00","article_modified_time":"2023-09-15T02:25:02+00:00","og_image":[{"width":300,"height":168,"url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/10\/Halloween_shutterstock_1838683894_small.png","type":"image\/png"}],"author":"Editorial Team","twitter_card":"summary_large_image","twitter_creator":"@insideBigData","twitter_site":"@insideBigData","twitter_misc":{"Written by":"Editorial Team","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/","url":"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/","name":"Infographic: Shadow Data Creeps in the Silence - insideBIGDATA","isPartOf":{"@id":"https:\/\/insidebigdata.com\/#website"},"datePublished":"2022-10-31T13:00:00+00:00","dateModified":"2023-09-15T02:25:02+00:00","author":{"@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9"},"breadcrumb":{"@id":"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insidebigdata.com\/2022\/10\/31\/infographic-shadow-data-creeps-in-the-silence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insidebigdata.com\/"},{"@type":"ListItem","position":2,"name":"Infographic: Shadow Data Creeps in the Silence"}]},{"@type":"WebSite","@id":"https:\/\/insidebigdata.com\/#website","url":"https:\/\/insidebigdata.com\/","name":"insideBIGDATA","description":"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insidebigdata.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9","name":"Editorial Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","caption":"Editorial Team"},"sameAs":["http:\/\/www.insidebigdata.com"],"url":"https:\/\/insidebigdata.com\/author\/editorial\/"}]}},"jetpack_featured_media_url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/10\/Halloween_shutterstock_1838683894_small.png","jetpack_shortlink":"https:\/\/wp.me\/p9eA3j-7ZP","jetpack-related-posts":[{"id":31328,"url":"https:\/\/insidebigdata.com\/2023\/01\/06\/top-three-cloud-data-security-predictions-for-2023\/","url_meta":{"origin":30741,"position":0},"title":"Top Three Cloud Data Security Predictions for 2023\u00a0","date":"January 6, 2023","format":false,"excerpt":"In this contributed article, Amit Shaked, CEO and co-founder of public cloud data protection startup Laminar, shares his perspective on what the data security landscape is shaping up to be in 2023. The cycle of business and innovation agility led to data proliferation and unintentional consequences of lost and stolen\u2026","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":16510,"url":"https:\/\/insidebigdata.com\/2016\/11\/20\/a-sane-solution-to-shadow-it\/","url_meta":{"origin":30741,"position":1},"title":"A Sane Solution to Shadow IT","date":"November 20, 2016","format":false,"excerpt":"In this contributed article, Nikhil Hasija, co-founder and CEO of Azuqua, discusses how it\u2019s time to recognize that lines of business will use unapproved SaaS where IT often responds to this problem by trying to destroy the value SaaS creates for an organization. IT should get creative and come to\u2026","rel":"","context":"In &quot;Google News Feed&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":30511,"url":"https:\/\/insidebigdata.com\/2022\/10\/03\/to-improve-enterprise-visibility-shine-a-light-on-dark-data-and-shadow-it%ef%bf%bc\/","url_meta":{"origin":30741,"position":2},"title":"To Improve Enterprise Visibility, Shine a Light on Dark Data and Shadow IT","date":"October 3, 2022","format":false,"excerpt":"In this contributed article, Danny Sandwell, Director of Product Marketing, erwin by Quest Software, discusses how defeating and eliminating dark data requires creating a strategy of enterprise visibility that empowers all users - whether IT, DevOps or line-of-business - to get insight into their IT environment, identify pain points and\u2026","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2022\/10\/DarkData_shutterstock_166283459.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":28785,"url":"https:\/\/insidebigdata.com\/2022\/03\/23\/data-fabric-the-right-remedy-for-an-unhealthy-cloud\/","url_meta":{"origin":30741,"position":3},"title":"Data Fabric: The Right Remedy for an Unhealthy Cloud","date":"March 23, 2022","format":false,"excerpt":"In this special guest feature, Krishna Tammana, Talend CTO, digs into why data fabric is seeing hype now, versus 10 years ago during the big data boom, and how companies can actually take advantage of this technology. Data fabric is a 2021 Gartner Hype Cycle emerging technology. But 78% of\u2026","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2022\/03\/Krishna.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":20989,"url":"https:\/\/insidebigdata.com\/2018\/08\/29\/modern-analytics-infrastructure\/","url_meta":{"origin":30741,"position":4},"title":"Improve Your Business with Modern Analytics Infrastructure","date":"August 29, 2018","format":false,"excerpt":"A new report from SAS explores how a modern analytics infrastructure and IT department can help you\u00a0increase productivity, maintain the highest data quality through a standard data governance model, and make critical decisions faster and with more confidence.","rel":"","context":"In &quot;Analytics&quot;","img":{"alt_text":"analytics infrastructure","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-23-at-10.08.15-AM.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":17446,"url":"https:\/\/insidebigdata.com\/2017\/03\/23\/forging-new-future-big-data-analytics\/","url_meta":{"origin":30741,"position":5},"title":"Forging a New Future for Big Data Analytics","date":"March 23, 2017","format":false,"excerpt":"In this special guest feature, Andrew Warfield, Chief Technology Officer\/Co-Founder of Coho Data, examines how Big data creates unique challenges within enterprise environments, and to better understand these challenges, we have to look at what big data really means for enterprises, particularly from a storage perspective.","rel":"","context":"In &quot;Analytics&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/30741"}],"collection":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/users\/10513"}],"replies":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/comments?post=30741"}],"version-history":[{"count":0,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/30741\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media\/30746"}],"wp:attachment":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media?parent=30741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/categories?post=30741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/tags?post=30741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}