Here's an article I found on Lifehacker, a useful, mainstream website. The article points to a step-by-step tutorial on how to circumvent IT's security controls using FreeProxy. Have a look.
Matt talks a little about circumventing applications in this post, and they are covered extensively in our Application Usage and Risk Report.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.