Story image

Five major risks of letting shadow IT go unchecked

Surely every administrator has heard of shadow IT, and probably many of you admins live in (peaceful) coexistence with these parallel, partly unknown IT infrastructures.

But just for those who might not be familiar with the concept, let's start from scratch.

Shadow IT refers to the hardware and/or software within a company that is not supported by the organisation's central IT department.

The term is often negative because it implies that the IT department has not approved the technology and may not even know that employees are using it at all.

In the field of shadow IT, complex infrastructures arise in everyday practices which are developed and built completely without the IT department - or even around them.

This ranges from manageable hardware environments to complete ERP solutions that are in daily use throughout the company, that are even using the official ERP system’s data, but are in no way accessible to the IT department.

Such independent infrastructures are often a management problem: if specialist departments are not offered adequate solutions and department heads have too much freedom in their IT decisions, situations can arise in which departmental solutions are created from the ground up.

Why is this a problem? Paessler has identified five of the most common risks that can arise from this perfect storm.

1. Cybersecurity

Hardware that is set up within a business department may not be protected by the organisation's IT security systems. There might be no firewall or virus scanner and vital firmware and software updates may not be installed.

This makes the shadow infrastructure, sensitive data, or even the entire company network vulnerable.

2. Data loss

The systems and applications running on shadow IT are very likely not part of the organisation’s backup and restore strategy.

If critical company data is lost in the event of an incident, this means substantial damage with unpredictable consequences for the company.

3. Data security

IT managers will not have an overview of how and when data is being accessed or, more worryingly, who is doing the accessing.

In the worst case, external service providers or former employees still have access to data which could lead to significant data breaches.

4. Inefficiency

Changes to hardware and software within any shadow IT may not undergo any testing.

While directly implemented systems and solutions may accelerate individual processes, due to the lack of testing they may end up stalling a series of other business processes, meaning business-critical IT resources are no longer available.

Shadow IT means double the administration and maintenance effort of systems and software - that’s if any maintenance within the shadow IT environment takes place at all.

5. Compliance

When using shadow IT, processes are often established in those specialist departments that violate the company’s existing compliance rules.

In fact, it is often the case that the introduction and use of shadow IT is already a violation of the usual company compliance rules.

For many companies, such a fundamental breach of compliance rules can threaten their very existence.

Story image
12 Sep
Citrix and Palo Alto Networks team up on SD-WAN protection
The collaboration aims to enable easy deployment and management of next-generation firewalls within Citrix SD-WAN.More
Story image
19 Sep
Mobile-first communications lead to huge productivity gains, study shows
“The slow adoption of most corporate-issued collaboratiokn platforms and the lack of support for secure mobile messaging should be a waeup call to business leaders that they need to view mobile first as their primary employee communication and collaboration channel."More
Story image
19 Sep
Voyager responds to rising bandwidth usage with 100 Gbit upgrade
Voyager Internet, the New Zealand ISP, has announced the completion of its 100 Gigabit upgrade of its core data network. According to the company, Voyager carried out the upgrade in response to rising bandwidth usage across the country.More
Story image
19 Sep
Zscaler and CrowdStrike partner on cloud and endpoint protection
CrowdStrike’s AI-powered Threat Graph will integrate with Zscaler’s cloud security platform to provide customers with real-time threat detection and automated policy enforcement.More
Story image
19 Sep
Flexible consumption models the way to customer's hearts
“Several factors suggest that flexible consumption offerings for on-premises IT will continue to attract new customers and generate growing revenue for vendors and service providers."More
Download image
How to empower IT professionals with key decision-making information
A cohesive RMM, PSA, and IT Documentation solution enables you to manage all essential MSP functions from a single pane of glass.More