Blog
home
  • Register

Data Net Blog

Shadow IT Is a Problem, or Is It?

Shadow IT Is a Problem, or Is It?

There has been a lot made about business network security over the past couple of years. One variable you often hear about is the danger that businesses face from the prevalence of employee-downloaded software on their network. This is what we call Shadow IT, and it can be a real problem. Conversely, under the right circumstances it can be a clear benefit too. Today, we’ll take a look at Shadow IT.

Shadow IT is Bad

Most people that work with computers have been for several years. They aren’t IT experts by any stretch of the imagination, but they know what software is effective at doing the job they need to do. This experience, if these employees were to just go ahead and download the software they want, can be an affront to the organization’s IT department that is actively trying to manage all of the computers.

The main issue is that any software that is downloaded may come with adware, spyware, malware, vulnerabilities, you name it. If software is downloaded outside of the knowledge of the IT staff, it likely won’t be identified as a software that needs patches and updates. Therefore, if you have unsupported software on network-attached workstations and devices, it creates vulnerabilities. If you have a continuous hole in your network, there are more opportunities for hackers to breach your network. It’s that simple. 

What are the risks? Here are a few:

  • A lack of security - Without the visibility and control over network-attached resources, IT management becomes much more difficult. If there is a potential that a piece of software can put a hole in your network, you are compromising the network’s security.
  • Problems with performance - If the tool that’s implemented doesn’t mesh with the system it’s being downloaded with, the app’s performance--and thus the user’s--will be compromised.
  • Compliance problems - If your organization needs to meet certain compliance standards, the presence of unmanaged software makes it almost impossible to meet said standards.
  • Data loss - If IT management doesn’t know that a software is on the network, it won’t be covered by organizational backup strategies, meaning work completed using shadow IT apps won’t be backed up.

Once you consider these variables, it makes sense why IT admins and most decision makers look at shadow IT as being problematic.

Shadow IT is Good?

Shadow IT’s use scares people, but that alone may not make it bad for your organization. Recently, there have been organizations that are changing the way they look at the practice. 

Since businesses are always looking to increase productivity and to maximize the use of organizational capital, sometimes they have to think outside the box. Shadow IT, for all its problems, allows workers to accomplish more with less, and it seems that IT admins are changing the way they look at employee-downloaded software. 

According to a study of 1,000 IT professionals, 77 percent believe that embracing shadow IT solutions can help a company innovate quicker than their direct competition. That’s not all.

  • 49 percent said that shadow IT boosts productivity.
  • 45 percent said that shadow IT helps promote employee engagement.
  • 40 percent said that shadow IT helps promote adherence to IT security requirements.
  • 40 percent said that shadow IT would help reduce employee turnover.

The survey shows that the IT community is split on how effective Shadow IT can be. To be clear, there aren’t many IT admins out there that are okay with having unsupported applications on company-owned machines. Shadow IT brought onto the network through employee-owned devices, however, is getting shown more leniency than ever before. Whichever way you look at it, it seems that shadow IT is no longer the “biggest threat to your business” as it was just a couple years ago.

If you would like to learn more about shadow IT, what constitutes shadow IT, or any other software and maintenance questions, call our knowledgeable professionals today at (760) 466-1200.

Why Social Engineering Needs to Be on Your Radar
Tip of the Week: How to Differentiate Work and Per...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 28, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity Data Privacy Smartphones Efficiency Malware Google IT Support Innovation Hackers Email User Tips Communication Microsoft Managed IT Services Computer Tech Term Software Communications Small Business Hardware Android Mobile Device Users Internet Cybersecurity VoIp Mobile Devices Cloud Business Management Workplace Tips Outsourced IT Windows 10 Miscellaneous Ransomware Social Media IT Services Business Collaboration Cloud Computing Passwords Hosted Solutions Data Backup Apps Network Wi-Fi Browser Internet of Things Backup Gadgets Managed Service Smartphone Bandwidth Holiday Windows Data recovery Upgrade Information Facebook Applications Networking Gmail Marketing Wireless Patch Management VPN Phishing Managed IT services Blockchain Access Control Chrome Employer-Employee Relationship Microsoft Office Quick Tips Save Money Word Laptop Compliance Router Saving Money BDR Value Managed IT Service Business Intelligence Apple Automation Net Neutrality Settings Processor Medical IT Telephony Data Security iPhone Artificial Intelligence Password Mobility Connectivity Business Technology Remote Monitoring Batteries Company Culture Virus Employee-Employer Relationship How To Paperless Office Windows 7 Cortana Retail Voice over Internet Protocol Telephone System Government Remote Computing Wireless Charging Physical Security Data Management Business Continuity Payment Cards G Suite Office Virtual Assistant Social Network Virtualization Excel Tech Terms Cost Management Office 365 Computers Bring Your Own Device Scam Data Breach Remote Monitoring and Management Data Protection RAM Healthcare Going Green Computer Repair Congratulations Edge Current Events Trends Error Tablet Network Attached Storage Environment Certification Amazon Spam Vulnerabilities Scams User Security Botnet IT budget Twitter Windows Server 2008 R2 Hybrid Cloud Outlook WannaCry IT Travel HP Recycling Printing Workers Solid State Drive Fleet Management Microsoft Teams Comparison Customer Relationship Management Cybercrime Tip of the week IT Service WhatsApp Dongle Human Resources Mobile Office A.I. Website e-waste Display Document Management Antivirus Cryptocurrency Project Management SaaS Voice over IP Inventory Taskbar Cables Profitability HIPAA Hosted Desktop Education Personal Information Paper File Sharing Millennials News Backup and Disaster Recovery Hard Disk Drive Multi-Factor Authentication Specifications Managed Service Provider Licensing Machine Learning Tactics Mobile Managed Services Provider Movies Touchscreen Knowledge Battery disposal Training Benchmarks Staff Search GDPR IT Management Mobile Security Help Desk National Security Eliminating Downtime Hard Drive Firewall Live Streaming E-Commerce Bitcoin Ink Hard Drives Video Mobile Device Management Managing Stress Conferencing Lead Generation Co-Managed IT Tech Support Analytics Electronic Health Records Vendor Microsoft Office 365 Server Management Security Cameras Risk Management Maintenance Plug-In Digital Websites Time Management Insurance Streaming Media Storage eCommerce Remote Support Operating System BYOD Processors Profiles Payment PowerPoint Cleaning SSD Customer Service Holidays Troubleshooting Humor Alert Vulnerability Telecommute Proactive IT Law Enforcement Telecommuting Health Unified Communications Authentication Wearables Internet Explorer Shadow IT Safety Chrome OS File Management Downloads Dark Web Sales Online Shopping Updates Wireless Internet User Tip Spyware instant Messaging Threats Sports Reporting OneNote Update Content Filtering Memes Data loss Threat Big Data Technology Tips Employees Distribution Authorization Server Virtual Private Network Database Analysis Disaster Recovery Printers WiFi Regulation Financial Thank You

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123