Occurs when data is stored in an unauthorized location, exposing it to potential leaks, breaches, and compliance violations. This often happens when sensitive information is moved outside approved environments.
Related Terms
Malconfiguration
A deliberate alteration of system configurations by malicious actors, often aiming to establish pers...
Shadow IT
Unapproved cloud accounts or solutions used by employees for business purposes. This might involve u...