{"id":2098,"date":"2025-12-09T16:50:53","date_gmt":"2025-12-09T19:50:53","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2098"},"modified":"2025-12-09T16:50:53","modified_gmt":"2025-12-09T19:50:53","slug":"shadow-it-risks-and-prevention","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/shadow-it-risks-and-prevention\/","title":{"rendered":"Shadow IT: o que \u00e9, quais s\u00e3o os riscos e como prevenir a \u201cTI invis\u00edvel\u201d"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Voc\u00ea j\u00e1 ouviu falar no termo \u201cshadow IT\u201d? Ele pode ser traduzido literalmente para o portugu\u00eas como \u201cTI das sombras\u201d, mas tamb\u00e9m ficou famoso por aqui como \u201cTI invis\u00edvel\u201d. Trata-se do uso indiscriminado, por parte dos colaboradores de uma empresa, de dispositivos, aplica\u00e7\u00f5es e plataformas que n\u00e3o foram autorizadas pelo departamento de TI para finalidades profissionais. Esse \u00e9 um problema antigo, mas que est\u00e1 se tornando cada vez mais comum e dif\u00edcil de conter \u2014 especialmente com a populariza\u00e7\u00e3o do trabalho remoto.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00c9 f\u00e1cil dar exemplos de shadow IT. Para fins ilustrativos, imagine que a sua companhia determinou que o servi\u00e7o X de armazenamento de arquivos na nuvem ser\u00e1 o servi\u00e7o oficial a ser utilizado para guardar todo e qualquer documento corporativo. Por\u00e9m, por um motivo qualquer \u2014 prefer\u00eancia pessoal, comodidade etc. \u2014, um funcion\u00e1rio decide, por conta pr\u00f3pria e sem avisar ningu\u00e9m, <a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/how-can-corporate-files-be-shared-securely\/\">armazenar documentos e arquivos de trabalho<\/a> no servi\u00e7o Y, que possivelmente n\u00e3o possui o mesmo n\u00edvel de seguran\u00e7a e confiabilidade.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Outros exemplos de TI invis\u00edvel incluem usar seu endere\u00e7o de e-mail pessoal ou contas de mensageiros para enviar e receber arquivos corporativos, usar apps aleat\u00f3rios para criar listas de tarefas, adotar sem aviso pr\u00e9vio uma plataforma para gest\u00e3o de projetos, manter comunica\u00e7\u00f5es de trabalho sigilosas com outros colaboradores em softwares alheios e assim por diante. Novamente, \u00e9 importante ressaltar que esse \u00e9 um problema antigo, mas que est\u00e1 se agravando principalmente com o trabalho remoto e h\u00edbrido, al\u00e9m da ado\u00e7\u00e3o massiva de pol\u00edticas como BYOD (bring your own device ou \u201ctraga seu pr\u00f3prio dispositivo\u201d), em que os colaboradores levam os pr\u00f3prios dispositivos para o trabalho.<\/span><\/p>\n<h2><b>Quais s\u00e3o os riscos?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Muitos! Primeiramente, \u00e9 crucial entender que o departamento de TI, em conjunto com o time de seguran\u00e7a da informa\u00e7\u00e3o, determina as ferramentas e plataformas que ser\u00e3o usadas para as opera\u00e7\u00f5es corporativas com base em uma s\u00e9rie de fatores: confiabilidade, estabilidade, flexibilidade, visibilidade e, \u00e9 \u00f3bvio, seguran\u00e7a. Em alguns casos, a escolha \u00e9 feita atrav\u00e9s de crit\u00e9rios cruciais para garantir conformidade com certa legisla\u00e7\u00e3o ou norma espec\u00edfica do setor comercial no qual a companhia atua.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Assim, usar ferramentas e plataformas n\u00e3o homologadas coloca em risco o trabalho cotidiano, tornando alguns arquivos e processos invis\u00edveis (da\u00ed o nome pelo qual a pr\u00e1tica ficou conhecida) para os gestores de seguran\u00e7a, que n\u00e3o ser\u00e3o capazes de proteger a empresa de poss\u00edveis amea\u00e7as criadas por essas pr\u00e1ticas. Tamb\u00e9m \u00e9 comum que, ao escolherem servi\u00e7os de sua pr\u00f3pria prefer\u00eancia para guardar informa\u00e7\u00f5es sens\u00edveis, os colaboradores abram portas para vazamentos de dados, pois o ambiente em quest\u00e3o n\u00e3o foi configurado corretamente ou n\u00e3o possui uma infraestrutura de prote\u00e7\u00e3o t\u00e3o madura.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Isso sem citar os casos mais extremos, nos quais os funcion\u00e1rios realizam verdadeiras \u201cgambiarras\u201d ou chegam ao n\u00edvel de utilizar softwares pirateados para seus afazeres profissionais. Al\u00e9m da quest\u00e3o \u00e9tica, tal postura os exp\u00f5e ao risco de ter a m\u00e1quina infectada por um malware.<\/span><\/p>\n<h2><b>F\u00e1cil de resolver<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">N\u00e3o h\u00e1 segredos aqui: para evitar que o shadow IT se alastre, cada colaborador deve fazer a sua parte e utilizar apenas os dispositivos, ferramentas e aplica\u00e7\u00f5es que receberam autoriza\u00e7\u00e3o pr\u00e9via dos times de TI e de seguran\u00e7a da informa\u00e7\u00e3o. Se voc\u00ea estiver enfrentando problemas com determinado software, por exemplo, vale a pena sinalizar isso de maneira formal para essas duas equipes e entender como tais quest\u00f5es podem ser resolvidas sem abrir m\u00e3o da seguran\u00e7a.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Felizmente, aos gestores, o mercado j\u00e1 disp\u00f5e de solu\u00e7\u00f5es que permitem monitorar melhor a rede em busca de \u201cescapes\u201d para \u00e1reas sombrias, tal como realizar um gerenciamento mais eficaz de ativos e licen\u00e7as de softwares.\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Have you ever heard of the term &#8220;shadow IT&#8221; or \u201cinvisible IT\u201d? It refers to the indiscriminate use of devices, applications, and platforms that have not been authorized to be used for professional purposes by the IT department. This is an old problem, but one that is becoming increasingly common and difficult to contain \u2013 [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2099,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[64,105,104],"class_list":["post-2098","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-it","tag-shadow-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Shadow IT: risks and prevention | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Understand why shadow IT threatens corporate security and learn practical ways to reduce risks by controlling unauthorized apps and devices.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shadow IT: risks and prevention | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Understand why shadow IT threatens corporate security and learn practical ways to reduce risks by controlling unauthorized apps and devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/shadow-it-risks-and-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-09T19:50:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Shadow-IT-risks-and-prevention.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Shadow IT: risks and prevention\",\"datePublished\":\"2025-12-09T19:50:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/\"},\"wordCount\":522,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Shadow-IT-risks-and-prevention.png\",\"keywords\":[\"cybersecurity\",\"IT\",\"shadow IT\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/\",\"name\":\"Shadow IT: risks and prevention | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Shadow-IT-risks-and-prevention.png\",\"datePublished\":\"2025-12-09T19:50:53+00:00\",\"description\":\"Understand why shadow IT threatens corporate security and learn practical ways to reduce risks by controlling unauthorized apps and devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Shadow-IT-risks-and-prevention.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Shadow-IT-risks-and-prevention.png\",\"width\":1500,\"height\":1000,\"caption\":\"Shadow IT risks and prevention\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shadow IT: risks and prevention\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shadow IT: risks and prevention | Hacker Rangers","description":"Understand why shadow IT threatens corporate security and learn practical ways to reduce risks by controlling unauthorized apps and devices.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Shadow IT: risks and prevention | Hacker Rangers","og_description":"Understand why shadow IT threatens corporate security and learn practical ways to reduce risks by controlling unauthorized apps and devices.","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/shadow-it-risks-and-prevention\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-09T19:50:53+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Shadow-IT-risks-and-prevention.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Shadow IT: risks and prevention","datePublished":"2025-12-09T19:50:53+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/"},"wordCount":522,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Shadow-IT-risks-and-prevention.png","keywords":["cybersecurity","IT","shadow IT"],"articleSection":["Cybersecurity"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/","name":"Shadow IT: risks and prevention | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Shadow-IT-risks-and-prevention.png","datePublished":"2025-12-09T19:50:53+00:00","description":"Understand why shadow IT threatens corporate security and learn practical ways to reduce risks by controlling unauthorized apps and devices.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Shadow-IT-risks-and-prevention.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Shadow-IT-risks-and-prevention.png","width":1500,"height":1000,"caption":"Shadow IT risks and prevention"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/shadow-it-risks-and-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Shadow IT: risks and prevention"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2098"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2098\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2099"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}