Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Defining Shadow IT and Its Risks

Defining Shadow IT and Its Risks

IT administrators are pretty particular about what software is used on the networks that they manage. This is not because we have any vested interest in the software itself, it’s because of the inherent reliability of the software they manage. They’ve tested it, they manage it, they know it. When an organization starts dealing with employee-downloaded software--especially if there is no procedure in place to report additions to IT--they can quickly lose control over the network. 

The software that isn’t properly vetted (or even reported most of the time) is called shadow IT. Since it’s the IT administrator’s job to oversee the data security and overall effectiveness of your company’s technology deployments, shadow IT can present them with a bunch of risk.  IT administrators hate risk. Today, we’ll take you through the good and bad of shadow IT.

Shadow IT is Bad

Most of the people that work with a computer have been working with similar technology for a long time. While they aren’t IT experts, they know what software works best for them. That experience will often result in them downloading software that hasn’t been approved by their company’s IT department or outsourced IT service vendor. This software, while useful for the user, may be a major problem for an organization, for several reasons.

The main issue is that any software that is downloaded may come with adware, spyware, malware, vulnerabilities, and other nefarious code that can put a business at risk. Worse yet, that software isn’t known to your IT admin, keeping it from the routine maintenance it needs to keep it from being a vulnerability. If your business carries vulnerable software, it can create a breachable hole in your network. So, while you may not see continuous problems, risk is magnified. 

What are the risks? Here are a few:

  • A lack of security - Without the visibility and control over network-attached resources, IT management becomes much more difficult. If there is a potential that a piece of software can put a hole in your network, you are compromising the network’s security.
  • Problems with performance - If the tool that’s implemented doesn’t mesh with the system it’s installed on, the app’s performance--and thus the user’s--will be compromised.
  • Compliance problems - If your organization needs to meet certain compliance standards, the presence of unmanaged software makes it almost impossible to meet said standards.
  • Data loss - If IT management doesn’t know that a software is on the network, it won’t be covered by organizational backup strategies, meaning work completed using shadow IT apps won’t be backed up.

The minute you understand the risks, it becomes clear why IT admins typically don’t like shadow IT at all.

Can Shadow IT be Good?

Risky behavior can be a major problem for a business. It can also result in significant reward. According to a study conducted in 2019, there is a shift in the way that IT admins are looking at shadow IT. This is mainly the result of organizations looking to improve productivity and to use available capital more effectively. For the detrimental risk that shadow IT can bring a company, there is an opportunity to save time and cut costs.

The study, which included 1,000 IT professionals, showed that a whopping 77 percent believe that embracing shadow IT solutions can help a company innovate quicker than their direct competition. That’s not all.

  • 49 percent said that shadow IT boosts productivity.
  • 45 percent said that shadow IT helps promote employee engagement.
  • 40 percent said that shadow IT helps promote adherence to IT security requirements.
  • 40 percent said that shadow IT would help reduce employee turnover.

Effectively, two-fifths of IT admins said that shadow IT’s detriments could be ignored. That’s not to say that I know any IT administrator that would be totally okay with having unsupported applications on company-owned machines. Not one would deliberately put a gaping hole in their organization’s network to boost productivity. 

What they would promote is the use of shadow IT that is brought onto the network through employee-owned devices. This practice is being shown more leniency now more than ever. After all, IT admins can’t possibly be responsible for every piece of software brought onto the network by employees. They bring laptops, and tablets, and smartphones, and IoT devices, and with all those devices, there are bound to be programs that IT admins typically wouldn’t want on there, but would accept if it kept decision makers happy and productivity high.

If you would like to learn more about shadow IT, what constitutes shadow IT, or have any other software and maintenance questions, call our knowledgeable professionals today at (415) 295-4898.

How to Tell When Your Technology Needs Upgrading
Tip of the Week: Simple Practices to Secure Your W...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 03 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Business Computing Best Practices Data Backup Data IT Support Network Security Hosted Solutions Privacy Cloud Data Recovery Software IT Services Outsourced IT Email Malware Business Internet Innovation Managed IT Services Tech Term Efficiency Upgrade Computer Cloud Computing User Tips Windows 10 Microsoft Hackers Business Management Hardware Phishing Small Business Google Mobile Devices Cybersecurity Collaboration Business Continuity Workplace Tips Managed Service Ransomware Backup Android Paperless Office Communication Smartphones VoIp Communications Server Office 365 Managed Service Provider Encryption Remote Monitoring Data Management Managed IT Quick Tips Healthcare Network Mobile Device Internet of Things BDR Passwords Artificial Intelligence Business Technology Holiday Vulnerability Disaster Recovery Windows 7 Wi-Fi Saving Money Facebook Browser Applications Compliance Miscellaneous Laptops Smartphone Managed IT services Help Desk Government Save Money Document Management Bandwidth Antivirus Virtualization Automation Social Media Microsoft Office Processor Blockchain Information Employer-Employee Relationship Tip of the week Project Management Vendor Management Scam Redundancy Avoiding Downtime Users Machine Learning BYOD Website Access Control Windows RMM Data Security Infrastructure Software as a Service IoT Meetings Mobility Data Loss Chrome Two-factor Authentication Storage OneDrive IT Management Router Maintenance VPN Analytics Customer Relationship Management Employee-Employer Relationship Networking Network Management Consultation Search Mobile Security Unified Communications Managed Services Provider Remote Workers Recycling Password Apps Files Time Management Virtual Private Network The Internet of Things Company Culture Co-Managed IT Gmail Risk Management Cooperation File Management Word Unified Threat Management Net Neutrality Regulations Patch Management Proactive Monitoring Management Payment Cards Hard Drive Tablet File Sharing Internet Exlporer Financial Server Management Dark Web Remote Monitoring and Management Augmented Reality Operating System Smart Technology Alert Gadgets Managed Services Computing Office Professional Services Training Assessment HIPAA Utility Computing Electronic Health Records Bring Your Own Device Employees Consulting Downtime Social Network Remote Computing Manufacturing Vendor Comparison Licensing Bookmarks ROI Modem Virtual Assistant High-Speed Internet Bitcoin Printer Digitize Tech Support Batteries Technology Tips Cyberattacks Social SaaS G Suite GDPR Unified Threat Management Computers Data Warehousing Fleet Tracking Flexibility Zero-Day Threat Legislation Mobile Device Management Mobile Wireless Internet Big Data Shortcut Proactive IT Windows Server 2008 Distributed Denial of Service Customer Service Smart Tech Transportation Active Directory Wireless Smart Devices Specifications Favorites Touchscreen Hacking Wasting Time Development Current Events Shadow IT IT Technicians Cost Management CIO applications Remote Work Lenovo Digital Payment Hotspot Read Only Security Cameras Motherboard Chromebook Holidays Asset Tracking Operations Backup and Disaster Recovery Samsung Point of Sale Tech Terms Heating/Cooling Employer/Employee Relationships Apple IT Consulting Managed IT Service MSP Finance Connectivity Windows Server Outsourcing Migration eWaste Hard Disk Drives Sensors Black Friday Conferencing Trending Cookies Database Cables SharePoint Superfish Mouse Language Printing Statistics Notes Vulnerabilities Mail Merge User Error IT Money Human Error User Management E-Commerce Theft Servers Managing Stress Proactive Maintenance Solid State Drive Data Breach Optimization Break Fix Authentication Video Conferencing Permissions Electronic Medical Records Chatbots Solid State Drives Cyber Monday Staff Nanotechnology Voice over Internet Protocol Wires Projects Downloads Recovery Mirgation Value of Managed Services Computing Infrastructure Remote Worker Bluetooth Mobile Computing PowerPoint Display Address WiFi Business Telephone Microsoft Excel OneNote Permission Wearable Technology Star Wars Teamwork Information Technology Features Spam Enterprise Content Management Cybercrime Cyber security Virtual Machines Authorization Biometric Google Calendar Fraud Identity Theft Enterprise Resource Planning Options Telephone Techology Politics App Return on Investment Test Cache Alerts Private Cloud Geography IT Assessment How To Shared resources Going Green Travel Procurement Websites Social Networking Database Management Technology Laws Credit Cards WPA3 Virtual Reality Multi-Factor Security Identity 5G Mobile VoIP Outlook Disaster Resistance Firewall Instant Messaging Screen Reader Settings Personal Information Emergency Education Twitter CEO Printers Students Daniel Stevens Marketing Gamification Regulation

Latest Blog

Once a mobile device outlives its presumed usefulness, the default assumption is that there is nothing left to do but dispose of it. However, before you do so, reconsider. There may be other ways that your device could show its utility. For today’s tip, we’ll review a few wa...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...