vCTO Secure Blog

vCTO Secure has been serving the Seattle area since 2011, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Shadow IT Is a Problem, or Is It?

Shadow IT Is a Problem, or Is It?

There has been a lot made about business network security over the past couple of years. One variable you often hear about is the danger that businesses face from the prevalence of employee-downloaded software on their network. This is what we call Shadow IT, and it can be a real problem. Conversely, under the right circumstances it can be a clear benefit too. Today, we’ll take a look at Shadow IT.

Shadow IT is Bad

Most people that work with computers have been for several years. They aren’t IT experts by any stretch of the imagination, but they know what software is effective at doing the job they need to do. This experience, if these employees were to just go ahead and download the software they want, can be an affront to the organization’s IT department that is actively trying to manage all of the computers.

The main issue is that any software that is downloaded may come with adware, spyware, malware, vulnerabilities, you name it. If software is downloaded outside of the knowledge of the IT staff, it likely won’t be identified as a software that needs patches and updates. Therefore, if you have unsupported software on network-attached workstations and devices, it creates vulnerabilities. If you have a continuous hole in your network, there are more opportunities for hackers to breach your network. It’s that simple. 

What are the risks? Here are a few:

  • A lack of security - Without the visibility and control over network-attached resources, IT management becomes much more difficult. If there is a potential that a piece of software can put a hole in your network, you are compromising the network’s security.
  • Problems with performance - If the tool that’s implemented doesn’t mesh with the system it’s being downloaded with, the app’s performance--and thus the user’s--will be compromised.
  • Compliance problems - If your organization needs to meet certain compliance standards, the presence of unmanaged software makes it almost impossible to meet said standards.
  • Data loss - If IT management doesn’t know that a software is on the network, it won’t be covered by organizational backup strategies, meaning work completed using shadow IT apps won’t be backed up.

Once you consider these variables, it makes sense why IT admins and most decision makers look at shadow IT as being problematic.

Shadow IT is Good?

Shadow IT’s use scares people, but that alone may not make it bad for your organization. Recently, there have been organizations that are changing the way they look at the practice. 

Since businesses are always looking to increase productivity and to maximize the use of organizational capital, sometimes they have to think outside the box. Shadow IT, for all its problems, allows workers to accomplish more with less, and it seems that IT admins are changing the way they look at employee-downloaded software. 

According to a study of 1,000 IT professionals, 77 percent believe that embracing shadow IT solutions can help a company innovate quicker than their direct competition. That’s not all.

  • 49 percent said that shadow IT boosts productivity.
  • 45 percent said that shadow IT helps promote employee engagement.
  • 40 percent said that shadow IT helps promote adherence to IT security requirements.
  • 40 percent said that shadow IT would help reduce employee turnover.

The survey shows that the IT community is split on how effective Shadow IT can be. To be clear, there aren’t many IT admins out there that are okay with having unsupported applications on company-owned machines. Shadow IT brought onto the network through employee-owned devices, however, is getting shown more leniency than ever before. Whichever way you look at it, it seems that shadow IT is no longer the “biggest threat to your business” as it was just a couple years ago.

If you would like to learn more about shadow IT, what constitutes shadow IT, or any other software and maintenance questions, call our knowledgeable professionals today at (206) 895-5595.

Why Social Engineering Needs to Be on Your Radar
Tip of the Week: How to Differentiate Work and Per...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Friday, 29 March 2024

Captcha Image

Mobile? Grab this Article

QR Code
Dark Web Monitoring

When you visit the Internet, you are more than likely sticking to the pages that can be accessed by typing an address into your browser, or by clicking on a link in a search result.

Find Out More
Contact Us

Learn more about what vCTO Secure can do for your business.

Seattle, Washington

Call us: (206) 895-5595

Protect Your Reputation

With human error causing over 92% of data breaches, we understand the importance of focusing on the weakest link by empowering employees through self-improvement, personal protection, and engaging training that is relate-able, not demeaning.

Find Out More