Story image

Five major risks of letting shadow IT go unchecked

Surely every administrator has heard of shadow IT, and probably many of you admins live in (peaceful) coexistence with these parallel, partly unknown IT infrastructures.

But just for those who might not be familiar with the concept, let's start from scratch.

Shadow IT refers to the hardware and/or software within a company that is not supported by the organisation's central IT department.

The term is often negative because it implies that the IT department has not approved the technology and may not even know that employees are using it at all.

In the field of shadow IT, complex infrastructures arise in everyday practices which are developed and built completely without the IT department - or even around them.

This ranges from manageable hardware environments to complete ERP solutions that are in daily use throughout the company, that are even using the official ERP system’s data, but are in no way accessible to the IT department.

Such independent infrastructures are often a management problem: if specialist departments are not offered adequate solutions and department heads have too much freedom in their IT decisions, situations can arise in which departmental solutions are created from the ground up.

Why is this a problem? Paessler has identified five of the most common risks that can arise from this perfect storm.

1. Cybersecurity

Hardware that is set up within a business department may not be protected by the organisation's IT security systems. There might be no firewall or virus scanner and vital firmware and software updates may not be installed.

This makes the shadow infrastructure, sensitive data, or even the entire company network vulnerable.

2. Data loss

The systems and applications running on shadow IT are very likely not part of the organisation’s backup and restore strategy.

If critical company data is lost in the event of an incident, this means substantial damage with unpredictable consequences for the company.

3. Data security

IT managers will not have an overview of how and when data is being accessed or, more worryingly, who is doing the accessing.

In the worst case, external service providers or former employees still have access to data which could lead to significant data breaches.

4. Inefficiency

Changes to hardware and software within any shadow IT may not undergo any testing.

While directly implemented systems and solutions may accelerate individual processes, due to the lack of testing they may end up stalling a series of other business processes, meaning business-critical IT resources are no longer available.

Shadow IT means double the administration and maintenance effort of systems and software - that’s if any maintenance within the shadow IT environment takes place at all.

5. Compliance

When using shadow IT, processes are often established in those specialist departments that violate the company’s existing compliance rules.

In fact, it is often the case that the introduction and use of shadow IT is already a violation of the usual company compliance rules.

For many companies, such a fundamental breach of compliance rules can threaten their very existence.

Dell EMC launches interactive AI Experience Zones
The AI Experience Zones are designed to educate visitors about how to start, identify, and implement an AI project.
What NZ can learn from the Baltimore cyberattack
“Businesses must control physical access to their computers and secure their networks."
Infratil seeks clearance to acquire up to 50% stake in Vodafone NZ
The commission will give clearance to a proposed merger if they are satisfied that the merger is unlikely to have the effect of substantially lessening competition in a market.
Hands-on review: MiniTool Power Data Recovery Software
I came across a wee gem of advice when researching the world of data recovery. As soon as you get that sinking feeling and realise you’ve lost a file, stop using your computer.
Deepfakes the 'next wave of concern' - but can law really stomp it out?
Enforcing the existing law will be difficult enough, and it is not clear that any new law would be able to do better. Overseas attempts to draft law for deepfakes have been seriously criticised.
Acquia delivers open source framework for contextual commerce
The framework connects the Drupal open source web content management system with e-commerce platforms from Acquia partners.
Are you all set to ride the new wave of technology disruption?
Why IT professionals are not immune to digital disruption.
Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."