{"id":14529,"date":"2022-10-05T09:00:15","date_gmt":"2022-10-05T07:00:15","guid":{"rendered":"https:\/\/www.topdesk.com\/da\/?p=14529"},"modified":"2025-01-08T14:51:42","modified_gmt":"2025-01-08T13:51:42","slug":"shadow-it","status":"publish","type":"post","link":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/","title":{"rendered":"Hvad er Shadow IT? F\u00e5 svar p\u00e5 5 ofte stillede sp\u00f8rgsm\u00e5l"},"content":{"rendered":"<p><strong>It-afdelingen er ansvarlig for organisationens it. Det lyder ret ligetil, ikke? Forkert. Skjult i m\u00f8rket og indhyllet som et mysterium \u00e5nder Shadow IT.\u00a0<\/strong><\/p>\n<h2>Hvad er Shadow IT?<\/h2>\n<p>Navnet siger alt: Shadow IT finder sted i skyggen &#8211; og it-afdelingen st\u00e5r tilbage i m\u00f8rket. Kort sagt henviser Shadow IT til alle former for it, der finder sted uden for &#8211; og uden godkendelse fra &#8211; it-afdelingen.<\/p>\n<p>Normalt bruger it-afdelingen sin ekspertise til at v\u00e6lge eller godkende ny software til organisationen. Med Shadow IT bruger andre afdelinger eller individuelle brugere tools eller enheder, som it-afdelingen ikke kender til.<\/p>\n<h2>Hvorfor forekommer Shadow IT?<\/h2>\n<p>Der er op til flere grunde til at Shadow IT opst\u00e5r, herunder:<\/p>\n<h3>Brugervenlighed<\/h3>\n<p>Med den enorme m\u00e6ngde tilg\u00e6ngelige web- og cloud-baserede teknologier og applikationer er det blevet lettere end nogensinde at bruge dine egne it-ressourcer. Enhver kan nemt downloade og bruge it-tools via et web interface med lidt eller ingen involvering fra it-afdelingen.<\/p>\n<h3>Organisationens it-innovation<\/h3>\n<p>De fleste afdelinger \u00f8nsker at innovere hurtigere, end it-afdelingen har ressourcer til. <a href=\"https:\/\/www.gartner.com\/en\/documents\/3782853\" target=\"_blank\" rel=\"noopener\">If\u00f8lge denne Gartner-rapport<\/a> kommer kun 40% af de samlede it-investeringer fra selve it-afdelingen. Afdelingerne finder simpelthen deres egne l\u00f8sninger: de investerer aktivt i it-software, der underst\u00f8tter deres innovationsindsats. Dette kan omfatte en investering i en ny applikation\/platform eller at s\u00f8ge hj\u00e6lp fra en ekstern it-konsulent.<\/p>\n<h2>Hvordan ser Shadow IT ud?<\/h2>\n<p>Der er nogle faktorer, som g\u00f8r Shadow IT mere udbredt:<\/p>\n<h3>BYOD: en dr\u00f8m eller et mareridt?<\/h3>\n<p><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/bring-your-own-device-byod#:~:text=Bring%20your%20own%20device%20(BYOD)%20is%20an%20alternative%20strategy%20allowing,also%20be%20used%20for%20PCs.\" target=\"_blank\" rel=\"noopener\">Bring Your Own Device (BYOD)<\/a> er fantastisk af flere \u00e5rsager. For det f\u00f8rste kan medarbejderne arbejde n\u00f8jagtigt, som de vil: hvad end de kan lide at bruge en Samsung-tablet, en MacBook eller en Xiaomi-smartphone. Men BYOD har ogs\u00e5 en m\u00f8rk side. Brugen af personlige enheder til at logge p\u00e5 virksomhedens netv\u00e6rk kan medf\u00f8re enorme sikkerhedsrisici. Is\u00e6r n\u00e5r personlige enheder er for\u00e6ldede eller bruger tvivlsom software \u2013 en hver hackers dr\u00f8m. Holder du styr p\u00e5 alle dine enheder?<\/p>\n<h3>Forbundet men adskilt<\/h3>\n<p>Nu hvor n\u00e6sten alle <a href=\"https:\/\/topdesk.com\/da\/blog\/itsm\/sikkerhed\/sikkerheden-ved-remote-arbejde\/\">arbejder hjemmefra<\/a>, skal medarbejderne finde nye m\u00e5der at holde forbindelsen til deres team og kolleger p\u00e5. L\u00f8sningen? Online-tools og applikationer som Microsoft Teams, Miro og Trello. Normalt downloader et team eller en afdeling simpelthen et nyt tool, og resten af \u200b\u200borganisationen f\u00f8lger automatisk trop.<\/p>\n<p>Resultatet? En sneboldeffekt. Pludselig bruger organisationen otte forskellige tools &#8211; og ingen har involveret it-afdelingen eller t\u00e6nkt over, hvordan disse applikationer h\u00e5ndterer personlige data.<\/p>\n<h3>F\u00e5 styr p\u00e5 dine assets<\/h3>\n<p>Nogle afdelinger er yderst ansvarlige. S\u00e5 ansvarlig, at de selv h\u00e5ndterer deres asset management &#8211; i stedet for at have centraliseret deres <a href=\"https:\/\/www.topdesk.com\/da\/ordliste\/hvad-er-asset-management\/\">asset management<\/a> hos it-afdelingen. S\u00e5danne afdelinger har deres eget private it-lager.<\/p>\n<p>S\u00e5 hvad sker der, n\u00e5r en medarbejder forlader organisationen? De afleverer deres b\u00e6rbare computer i deres afdeling. Uger senere f\u00e5r de et opkald fra it, som sp\u00f8rger efter den b\u00e6rbare computer. I mellemtiden har afdelingen allerede givet computeren til en ny medarbejder. It-afdelingen har ingen id\u00e9 om, hvor mange it-assets de har, hvor de er og om noget mangler.<\/p>\n<h2>Hvad er konsekvenserne af Shadow IT?<\/h2>\n<p>&#8220;Hvis du ikke kan se det; kan du ikke kontrollere det&#8221;, det g\u00e6lder bestemt for Shadow IT. Shadow IT skaber usynlige risici, som it-afdelingen ikke kan tackle, fordi de i f\u00f8rste omgang ikke kender til dem. Det \u00f8ger ogs\u00e5 organisationens angrebsflade, som f.eks. bliver mere modtagelig for datal\u00e6kager.<\/p>\n<p>It-afdelingen er ansvarlig for sikkerhed, overholdelse og privatliv i organisationen. Shadow IT udg\u00f8r en \u00e6gte trussel mod alle disse tre, is\u00e6r i st\u00f8rre organisationer. Jo flere applikationer, tools og enheder der er, jo sv\u00e6rere er det at kontrollere dem.<\/p>\n<h2>Hvordan administrerer jeg Shadow IT?<\/h2>\n<h3>\u00d8g bevidstheden<\/h3>\n<p>Du kan simpelthen ikke undg\u00e5 Shadow IT, uanset hvor meget du end pr\u00f8ver. Det er blevet nemmere at bruge dine egne it-ressourcer &#8211; i form af web- og cloud-baserede teknologier og applikationer. Dette betyder ikke, at du bare skal acceptere det. Du skal stadig lukke alt, der er farligt eller udg\u00f8r en for stor risiko.<\/p>\n<p>Men der er ogs\u00e5 en anden l\u00f8sning: uddannelse. Det er centralt at alle medarbejdere ved, hvor vigtigt overholdelsen af sikkerhed og privathed er. De fleste brugere er simpelthen uvidende om konsekvenserne, n\u00e5r de tilmelder sig Trello eller logger ind p\u00e5 virksomhedsnetv\u00e6rket ved hj\u00e6lp af en for\u00e6ldet enhed. Du kan derfor med fordel Indf\u00f8re simple retningslinjer, som brugerne skal f\u00f8lge, n\u00e5r de bruger deres egen hardware eller software, s\u00e5som multifaktorautentificering.<\/p>\n<h3>Samarbejd med resten af organisationen<\/h3>\n<p>For at undg\u00e5 risiciene ved Shadow IT skal it og de andre afdelinger forene deres kr\u00e6fter. P\u00e5 den ene side har afdelingerne brug for it-afdelingens viden og ekspertise. P\u00e5 den anden side \u00f8nsker it at sikre, at afdelingerne investerer i en sikker l\u00f8sning.<\/p>\n<p>S\u00e5 hvordan samarbejder du bedst sammen med de andre afdelinger? Tilbyd dine services og s\u00f8rg for, at alle afdelingerne ved, hvor de kan finde it. P\u00e5tag dig en r\u00e5dgivende rolle i hvert innovationsprojekt, fra orienteringsfasen indtil implementeringen af \u200b\u200bet nyt tool.<\/p>\n<p>En win-win-situation: afdelingerne forbliver innovative, og it kan sove trygt om natten (og drage fordel af afdelingernes innovation og budget).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It-afdelingen er ansvarlig for organisationens it. Det lyder ret ligetil, ikke? Forkert. Skjult i m\u00f8rket og indhyllet som et mysterium \u00e5nder Shadow IT.\u00a0 Hvad er Shadow IT? Navnet siger alt: Shadow IT finder sted i skyggen &#8211; og it-afdelingen st\u00e5r tilbage i m\u00f8rket. Kort sagt henviser Shadow IT til alle former for it, der finder<\/p>\n","protected":false},"author":379,"featured_media":16642,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"editor_notices":[],"footnotes":""},"class_list":["post-14529","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":{"blog_author":17394,"blog_hubspot_cta_link":"","toc_display":"compact","blog_promotion_overwrite":false,"blog_promotion":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hvad er Shadow IT? F\u00e5 svar p\u00e5 5 ofte stillede sp\u00f8rgsm\u00e5l<\/title>\n<meta name=\"description\" content=\"Har du h\u00f8rt som begrebet Shadow IT? L\u00e6r mere om det pr\u00e6cis er, hvordan du ung\u00e5r det og hvilke it-sikkerhedstiltag du b\u00f8r have fokus p\u00e5.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hvad er Shadow IT? F\u00e5 svar p\u00e5 5 ofte stillede sp\u00f8rgsm\u00e5l | Bedre support, glade kunder | TOPdesk\" \/>\n<meta property=\"og:description\" content=\"Har du h\u00f8rt som begrebet Shadow IT? L\u00e6r mere om det pr\u00e6cis er, hvordan du ung\u00e5r det og hvilke it-sikkerhedstiltag du b\u00f8r have fokus p\u00e5.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/\" \/>\n<meta property=\"og:site_name\" content=\"T2 TOPdesk - DA\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TOPdesk\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T07:00:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-08T13:51:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/header-hvad-er-shadow-it.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Camille\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@topdesk\" \/>\n<meta name=\"twitter:site\" content=\"@topdesk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camille\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/\"},\"author\":{\"name\":\"Camille\",\"@id\":\"https:\/\/www.topdesk.com\/da\/#\/schema\/person\/d5c66687e696681558408f7365411160\"},\"headline\":\"Hvad er Shadow IT? F\u00e5 svar p\u00e5 5 ofte stillede sp\u00f8rgsm\u00e5l\",\"datePublished\":\"2022-10-05T07:00:15+00:00\",\"dateModified\":\"2025-01-08T13:51:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/\"},\"wordCount\":886,\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/header-hvad-er-shadow-it.png\",\"articleSection\":[\"ITSM\",\"Sikkerhed\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/\",\"url\":\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/\",\"name\":\"Hvad er Shadow IT? F\u00e5 svar p\u00e5 5 ofte stillede sp\u00f8rgsm\u00e5l\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/header-hvad-er-shadow-it.png\",\"datePublished\":\"2022-10-05T07:00:15+00:00\",\"dateModified\":\"2025-01-08T13:51:42+00:00\",\"description\":\"Har du h\u00f8rt som begrebet Shadow IT? L\u00e6r mere om det pr\u00e6cis er, hvordan du ung\u00e5r det og hvilke it-sikkerhedstiltag du b\u00f8r have fokus p\u00e5.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#primaryimage\",\"url\":\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/header-hvad-er-shadow-it.png\",\"contentUrl\":\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/header-hvad-er-shadow-it.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.topdesk.com\/da\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hvad er Shadow IT? F\u00e5 svar p\u00e5 5 ofte stillede sp\u00f8rgsm\u00e5l\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.topdesk.com\/da\/#website\",\"url\":\"https:\/\/www.topdesk.com\/da\/\",\"name\":\"TOPdesk\",\"description\":\"Brugervenlig service management og ticketing software. TOPdesk hj\u00e6lper 4000+ virksomheder verden over med at supportere deres kunder. SaaS eller On-premise.\",\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.topdesk.com\/da\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.topdesk.com\/da\/#organization\",\"name\":\"TOPdesk\",\"url\":\"https:\/\/www.topdesk.com\/da\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/da\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/TOPdesk_RGB_Logo.svg\",\"contentUrl\":\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/TOPdesk_RGB_Logo.svg\",\"width\":1,\"height\":1,\"caption\":\"TOPdesk\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TOPdesk\/\",\"https:\/\/x.com\/topdesk\",\"https:\/\/www.instagram.com\/topdeskuk\/\",\"https:\/\/www.linkedin.com\/company\/topdesk\/\",\"https:\/\/www.youtube.com\/user\/topdesk\",\"https:\/\/en.wikipedia.org\/wiki\/TOPdesk\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.topdesk.com\/da\/#\/schema\/person\/d5c66687e696681558408f7365411160\",\"name\":\"Camille\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/da\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/536b583efa467323a58b4378dcc4db34502b8a97a3ce830f171429d920e09488?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/536b583efa467323a58b4378dcc4db34502b8a97a3ce830f171429d920e09488?s=96&d=mm&r=g\",\"caption\":\"Camille\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hvad er Shadow IT? F\u00e5 svar p\u00e5 5 ofte stillede sp\u00f8rgsm\u00e5l","description":"Har du h\u00f8rt som begrebet Shadow IT? L\u00e6r mere om det pr\u00e6cis er, hvordan du ung\u00e5r det og hvilke it-sikkerhedstiltag du b\u00f8r have fokus p\u00e5.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/","og_locale":"en_US","og_type":"article","og_title":"Hvad er Shadow IT? F\u00e5 svar p\u00e5 5 ofte stillede sp\u00f8rgsm\u00e5l | Bedre support, glade kunder | TOPdesk","og_description":"Har du h\u00f8rt som begrebet Shadow IT? L\u00e6r mere om det pr\u00e6cis er, hvordan du ung\u00e5r det og hvilke it-sikkerhedstiltag du b\u00f8r have fokus p\u00e5.","og_url":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/","og_site_name":"T2 TOPdesk - DA","article_publisher":"https:\/\/www.facebook.com\/TOPdesk\/","article_published_time":"2022-10-05T07:00:15+00:00","article_modified_time":"2025-01-08T13:51:42+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/header-hvad-er-shadow-it.png","type":"image\/png"}],"author":"Camille","twitter_card":"summary_large_image","twitter_creator":"@topdesk","twitter_site":"@topdesk","twitter_misc":{"Written by":"Camille","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#article","isPartOf":{"@id":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/"},"author":{"name":"Camille","@id":"https:\/\/www.topdesk.com\/da\/#\/schema\/person\/d5c66687e696681558408f7365411160"},"headline":"Hvad er Shadow IT? F\u00e5 svar p\u00e5 5 ofte stillede sp\u00f8rgsm\u00e5l","datePublished":"2022-10-05T07:00:15+00:00","dateModified":"2025-01-08T13:51:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/"},"wordCount":886,"publisher":{"@id":"https:\/\/www.topdesk.com\/da\/#organization"},"image":{"@id":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/header-hvad-er-shadow-it.png","articleSection":["ITSM","Sikkerhed"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/","url":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/","name":"Hvad er Shadow IT? F\u00e5 svar p\u00e5 5 ofte stillede sp\u00f8rgsm\u00e5l","isPartOf":{"@id":"https:\/\/www.topdesk.com\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#primaryimage"},"image":{"@id":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/header-hvad-er-shadow-it.png","datePublished":"2022-10-05T07:00:15+00:00","dateModified":"2025-01-08T13:51:42+00:00","description":"Har du h\u00f8rt som begrebet Shadow IT? L\u00e6r mere om det pr\u00e6cis er, hvordan du ung\u00e5r det og hvilke it-sikkerhedstiltag du b\u00f8r have fokus p\u00e5.","breadcrumb":{"@id":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#primaryimage","url":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/header-hvad-er-shadow-it.png","contentUrl":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/header-hvad-er-shadow-it.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.topdesk.com\/da\/"},{"@type":"ListItem","position":2,"name":"Hvad er Shadow IT? F\u00e5 svar p\u00e5 5 ofte stillede sp\u00f8rgsm\u00e5l"}]},{"@type":"WebSite","@id":"https:\/\/www.topdesk.com\/da\/#website","url":"https:\/\/www.topdesk.com\/da\/","name":"TOPdesk","description":"Brugervenlig service management og ticketing software. TOPdesk hj\u00e6lper 4000+ virksomheder verden over med at supportere deres kunder. SaaS eller On-premise.","publisher":{"@id":"https:\/\/www.topdesk.com\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.topdesk.com\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.topdesk.com\/da\/#organization","name":"TOPdesk","url":"https:\/\/www.topdesk.com\/da\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/da\/#\/schema\/logo\/image\/","url":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/TOPdesk_RGB_Logo.svg","contentUrl":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/TOPdesk_RGB_Logo.svg","width":1,"height":1,"caption":"TOPdesk"},"image":{"@id":"https:\/\/www.topdesk.com\/da\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TOPdesk\/","https:\/\/x.com\/topdesk","https:\/\/www.instagram.com\/topdeskuk\/","https:\/\/www.linkedin.com\/company\/topdesk\/","https:\/\/www.youtube.com\/user\/topdesk","https:\/\/en.wikipedia.org\/wiki\/TOPdesk"]},{"@type":"Person","@id":"https:\/\/www.topdesk.com\/da\/#\/schema\/person\/d5c66687e696681558408f7365411160","name":"Camille","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/da\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/536b583efa467323a58b4378dcc4db34502b8a97a3ce830f171429d920e09488?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/536b583efa467323a58b4378dcc4db34502b8a97a3ce830f171429d920e09488?s=96&d=mm&r=g","caption":"Camille"}}]}},"_links":{"self":[{"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/posts\/14529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/users\/379"}],"replies":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/comments?post=14529"}],"version-history":[{"count":7,"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/posts\/14529\/revisions"}],"predecessor-version":[{"id":25410,"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/posts\/14529\/revisions\/25410"}],"acf:post":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/person\/17394"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/media\/16642"}],"wp:attachment":[{"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/media?parent=14529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}