Story image

Are you sick of shadow IT's ever-looming digital danger?

15 Sep 16

“Shadow IT” means the creation of IT systems without specific approval of the IT team. In the good old days, this was mostly limited to users creating Microsoft Access databases and complex Excel spreadsheets.

IT teams used to feel the same way about Microsoft Excel and Access as they did about viruses. They appeared innocuous at first. But then they spread throughout the organisation, increasing IT support requirements and often resulting in company data being lost.

Staff felt justified because they made themselves more productive; it was faster than waiting for the IT team to build something. But over time, increasingly complex applications based on Excel and Access became mission-critical.

The IT teams knew that over their lifetime, these applications cause massive ongoing costs and present significant risks. But to try to stop them was to literally stand in the way of progress.

Cloud makes Shadow IT even more dangerous and infectious

Today, most shadow IT takes the form of cloud applications, which are simple for anyone to setup and use. Consumer services like Facebook, Google Apps and Uber have shown us all how easy cloud services can be.

The IT teams, however, are tasked not only with trying to innovate quickly, but also to maintain good security and reliability. Business technology isn’t as simple as consumer solutions – and they know that “simple” doesn’t always mean “good”.

Dropbox is a cloud service many people flocked to – including business users. But hackers stole 68 million email addresses and passwords from Dropbox, which is a massive risk for business data stored there.

Shadow IT is often confused with Digital Transformation

There is a worrying trend for businesses to look at shadow IT as great examples of becoming digital. But in truth it is the exact opposite. Becoming truly digital means deeply and strategically incorporating technology in everything we do.

Shadow IT, on the other hand, is a very tactical response to a specific need. It is the proliferation of piecemeal solutions, which will likely limit the business in the future.

For example, being digital relies on being able to derive deep insights about customers, markets and trends using Big Data. This isn’t possible if data is scattered in a range of cloud solutions that the IT team don’t even know about.

We need to reduce the risk of Shadow IT

History is repeating itself; and we need to learn from the past to avoid the same mistakes. 

I have witnessed many Excel spreadsheets and Access databases become part of a critical business process, only to be corrupted or deleted – with no backup in place. [Full disclosure: I was responsible for several of them]

The only way to stop the shadow IT virus is for the business and the IT team to work together more closely. Business people need to see IT as their responsibility too – just as the IT team need to consider themselves responsible for unleashing business initiatives.

The business and IT need to get closer - and faster

Technology decisions don’t have to take months of analysis and planning. But neither should they be made in isolation.

A new balance is required.

You need a common language between the business and IT – a shared plan and vision of the digital future. A simple visual model is the easiest way to get everyone on board. The goal is to quickly set the direction, not the destination, so work can start quickly.

Start innovating quickly - but safely

Once the direction is understood, tactical solutions can be adopted in parallel to strategic ones. Investment can be made knowing whether they are short-term "throw away" initiatives or part of the long term goal.

Agile and Lean methodologies should be used where possible. These approaches (done properly) create a new culture. The barriers between the business and IT stakeholders are removed – and there’s no need for shadow IT.

Article by David Reiss, digital transformation consultant and thought leader at Equinox IT.

Survey reveals CX disconnect is risky business
Too much conversation and too little action could lead companies to neglect, lose, and repel their very lifeblood, according to Dimension Data.
Should AI technology determine the necessity for cyber attack responses?
Fujitsu has developed an AI that supposedly automatically determines whether action needs to be taken in response to a cyber attack.
Police making progress into Cryptopia breach
New Zealand Police say they are making ‘good progress’ into the investigation of an alleged cryptocurrency theft from Christchurch-based crypto exchange Cryptopia.
NEC concludes wireless transport SDN proof of concept
"Operation and management of 5G networks are very complicated and require automation and closed-loop control with timely data refinement and quick action."
Trend Micro’s telecom security solution certified as VMware-ready
Certification by VMware allows communications service providers who prefer or have already adopted VMware vCloud NFV to add network security services from Trend Micro.
Top cybersecurity threats of 2019 – Carbon Black
Carbon Black chief cybersecurity officer Tom Kellermann combines his thoughts with those of Carbon Black's threat analysts and security strategists.
Avaya introduces private cloud delivery of its UCaaS solution
Avaya is supposedly taking a flexible hybrid approach to the cloud with these new solutions.
Data growth the growing case for managed colocation
The relentless growth of data could see colocation take on a new importance, says Jon Lucas.