The problem is that when end-users are using whatever solutions they choose without IT approval, the risk of leakage of important information and the opportunity for other security and compliance failures goes way up.
Many executives and employees fail to see how these valuable tools can expose the organization to increased risk of data leakage and lost intellectual property.