When it comes to network security, we often see organizations having one of two approaches: 1) They make security a priority by implementing airtight solutions, or 2) They have no clue what network security means. Of course, if a company doesn’t have security put into place, employees might take matters into their own hands and implement unauthorized solutions. This is called shadow IT, and it has unfortunate results, even if the user has good intentions.