• Register

Data Net Blog

By accepting you will be accessing a service provided by a third-party external to

Shadow IT Is a Problem, or Is It?

Shadow IT Is a Problem, or Is It?

There has been a lot made about business network security over the past couple of years. One variable you often hear about is the danger that businesses face from the prevalence of employee-downloaded software on their network. This is what we call Shadow IT, and it can be a real problem. Conversely, under the right circumstances it can be a clear benefit too. Today, we’ll take a look at Shadow IT.

Shadow IT is Bad

Most people that work with computers have been for several years. They aren’t IT experts by any stretch of the imagination, but they know what software is effective at doing the job they need to do. This experience, if these employees were to just go ahead and download the software they want, can be an affront to the organization’s IT department that is actively trying to manage all of the computers.

The main issue is that any software that is downloaded may come with adware, spyware, malware, vulnerabilities, you name it. If software is downloaded outside of the knowledge of the IT staff, it likely won’t be identified as a software that needs patches and updates. Therefore, if you have unsupported software on network-attached workstations and devices, it creates vulnerabilities. If you have a continuous hole in your network, there are more opportunities for hackers to breach your network. It’s that simple. 

What are the risks? Here are a few:

  • A lack of security - Without the visibility and control over network-attached resources, IT management becomes much more difficult. If there is a potential that a piece of software can put a hole in your network, you are compromising the network’s security.
  • Problems with performance - If the tool that’s implemented doesn’t mesh with the system it’s being downloaded with, the app’s performance--and thus the user’s--will be compromised.
  • Compliance problems - If your organization needs to meet certain compliance standards, the presence of unmanaged software makes it almost impossible to meet said standards.
  • Data loss - If IT management doesn’t know that a software is on the network, it won’t be covered by organizational backup strategies, meaning work completed using shadow IT apps won’t be backed up.

Once you consider these variables, it makes sense why IT admins and most decision makers look at shadow IT as being problematic.

Shadow IT is Good?

Shadow IT’s use scares people, but that alone may not make it bad for your organization. Recently, there have been organizations that are changing the way they look at the practice. 

Since businesses are always looking to increase productivity and to maximize the use of organizational capital, sometimes they have to think outside the box. Shadow IT, for all its problems, allows workers to accomplish more with less, and it seems that IT admins are changing the way they look at employee-downloaded software. 

According to a study of 1,000 IT professionals, 77 percent believe that embracing shadow IT solutions can help a company innovate quicker than their direct competition. That’s not all.

  • 49 percent said that shadow IT boosts productivity.
  • 45 percent said that shadow IT helps promote employee engagement.
  • 40 percent said that shadow IT helps promote adherence to IT security requirements.
  • 40 percent said that shadow IT would help reduce employee turnover.

The survey shows that the IT community is split on how effective Shadow IT can be. To be clear, there aren’t many IT admins out there that are okay with having unsupported applications on company-owned machines. Shadow IT brought onto the network through employee-owned devices, however, is getting shown more leniency than ever before. Whichever way you look at it, it seems that shadow IT is no longer the “biggest threat to your business” as it was just a couple years ago.

If you would like to learn more about shadow IT, what constitutes shadow IT, or any other software and maintenance questions, call our knowledgeable professionals today at (760) 466-1200.

Why Social Engineering Needs to Be on Your Radar
Tip of the Week: How to Differentiate Work and Per...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 14, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Privacy Communication Malware Hackers IT Support Smartphones Small Business Innovation User Tips Communications Google Cloud Hardware VoIp Mobile Device Workplace Tips Email Microsoft Computer Software Users Managed IT Services Tech Term Android Internet Business Management Cybersecurity Business Outsourced IT Hosted Solutions Mobile Devices Windows 10 Ransomware Collaboration Cloud Computing Backup Social Media Miscellaneous Network IT Services Passwords Data Backup Managed Service Smartphone Wi-Fi Upgrade Apps Saving Money Phishing Data recovery Information Browser Internet of Things Holiday Windows Gadgets Bandwidth Applications Wireless Facebook Networking Microsoft Office Managed IT services Patch Management VPN BDR Employer-Employee Relationship Blockchain Gmail Access Control Marketing Chrome Automation Data Breach Quick Tips Router Save Money Conferencing Word Laptop Managed IT Service Voice over Internet Protocol Compliance Value Going Green Business Intelligence Mobile Office Apple Medical IT Windows 7 Twitter Artificial Intelligence Cortana Password iPhone Government Remote Computing Business Continuity Connectivity Wireless Charging Company Culture Remote Monitoring Disaster Recovery Education Payment Cards Office Virtual Assistant Health Social Network How To Paperless Office Virus Virtualization Retail Remote Work Office 365 Healthcare Telephone System Data Management Physical Security Data Protection Processor Server Net Neutrality G Suite Settings Telephony Data Security Tech Terms Cost Management Excel Mobility Bring Your Own Device Computers Scam Remote Monitoring and Management Business Technology Batteries Covid-19 RAM Employee-Employer Relationship Meetings Hybrid Cloud Outlook Help Desk National Security HP Spam Firewall Congratulations Knowledge Battery Search IT budget Hard Drive Video Mobile Device Management Cybercrime Co-Managed IT Printing Travel E-Commerce Bitcoin Management Microsoft Teams Botnet Lead Generation Electronic Health Records Vendor e-waste Security Cameras Risk Management Dongle Recovery A.I. Printer Cables Website Profitability Document Management Antivirus Profiles WhatsApp SaaS Time Management Insurance Inventory Processors Customer Service Holidays Machine Learning Tactics Humor Paper eCommerce Payment Backup and Disaster Recovery Remote Working disposal Licensing Wearables Virtual Reality Movies News Touchscreen Mobile Security Eliminating Downtime Law Enforcement Telecommuting Updates Staff Shadow IT GDPR Chrome OS File Management IT Management Managing Stress User Tip Spyware OneNote Memes Ink Live Streaming Sales Online Shopping instant Messaging Threats Hard Drives Content Filtering Employees Distribution Server Management Virtual Private Network Maintenance Tech Support Plug-In Analytics Remote Microsoft Office 365 Operating System BYOD Certification Digital Websites Computer Repair Streaming Media Storage Current Events Remote Support Troubleshooting Windows Server 2008 R2 Telecommute IT PowerPoint Tablet Vulnerabilities Scams SSD PCI DSS WannaCry Solid State Drive Fleet Management Customer Relationship Management Internet Explorer Alert Proactive IT Vulnerability User Security Recycling Remote Workers Unified Communications Cleaning Authentication Wireless Internet Workers Display Safety IT Service Downloads Dark Web Comparison Human Resources Regulations Compliance Update Tip of the week Taskbar Data loss Hosted Desktop Sports Reporting Cryptocurrency Project Management HIPAA Hard Disk Drive Multi-Factor Authentication Database Managed Service Provider Threat Voice over IP Personal Information Big Data Technology Tips Authorization Managed Services Provider Network Attached Storage Environment Amazon File Sharing Millennials Training Benchmarks Edge Mobile Trends Error Specifications Analysis Financial Printers WiFi Regulation Thank You

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123