BNMC Blog

The Good and Bad of Shadow IT

The Good and Bad of Shadow IT

Shadow IT is the moniker that people in the technology industry have coined for applications that employees download that aren’t vetted for use on an organization’s networks. For the better part of the past decade, IT administrators have universally demeaned the use of unsanctioned software for use on company networks due to potential vulnerabilities that come with these applications and any phantom costs associated with their use. What may surprise you is that some organizations are rolling back their shadow IT policies. Today, we will take a look at both ends of this issue.

Shadow IT is Bad

Let’s face it, most people working today have been using technology for over 20 years. They may not be IT experts (they aren’t), but they aren’t novice users either. They can spot a tool when they see one. For the end-user, finding solutions to their problems in the form of a simple-to-download application, is a no brainer, especially if the person is proficient with the unauthorized software. They won’t think twice before downloading the title. 

The problem, quite obviously, is that the software being downloaded may have vulnerabilities upon download; and, if it’s allowed to fester without updates on a workstation for some time, will likely have some. Unfortunately, vulnerable software on a network endpoint is a hole in the network itself. We spend a lot of time on this blog talking about cybersecurity, and one of the big no-nos is leaving unpatched holes in your network by not frequently patching and updating software. Since the IT department or managed IT provider handles this process, if they don’t look for a software to update (because they often don’t know it is there), it will likely be a problem before long. 

What are the potential risks? There are a multitude. They include:

  • A lack of security - Without the visibility and control over network-attached resources, IT management becomes much more difficult. If there is a potential that a piece of software can put a hole in your network, you are compromising the network’s security.
  • Problems with performance - If the tool that’s implemented doesn’t mesh with the system it’s being downloaded with, the app’s performance--and thus the user’s--will be compromised.
  • Compliance problems - If your organization needs to meet certain compliance standards, the presence of unmanaged software makes it almost impossible to meet said standards.
  • Data loss - If IT management doesn’t know that a software is on the network, it won’t be covered by organizational backup strategies, meaning work completed using shadow IT apps won’t be backed up.

You can see why IT admins and most decision makers look at shadow IT as problematic.

Shadow IT is Good

There aren’t too many issues in life that are dialectically bad. There is always a bit of positive with anything, including shadow IT. Recently, there has been a shift in the way that some organizational leaders and IT professionals look at shadow IT. You see, businesses are always looking to increase productivity, to get the most out of their available capital, to find solutions for problems. Shadow IT, for all its problems, allows workers to accomplish all three of these fundamental goals; and, it seems IT admins are coming around.
According to a study of 1,000 IT professionals, 77 percent believe that embracing shadow IT solutions can help a company innovate quicker than their direct competition. That’s not all.

  • 49 percent said that shadow IT boosts productivity.
  • 45 percent said that shadow IT helps promote employee engagement.
  • 40 percent said that shadow IT helps promote adherence to IT security requirements.
  • 40 percent said that shadow IT would help reduce employee turnover.

This survey seemingly splits the IT community in half, with half believing shadow IT to be an active menace and half believing there are strong benefits to promoting the use of some shadow IT resources. Now, I don’t know any IT professional that would be okay with employees downloading unauthorized software on company-owned machines, but because shadow IT extends to employee-owned devices, there may be opportunities to allow employees to use the software they are most comfortable with on their own devices, just as long as the organization has made contingencies for it. Either way, taking in the numbers above, shadow IT is not considered the “biggest threat to your business” as it has been for the past several years.

If you would like to learn more about shadow IT, what constitutes shadow IT, or any other software and maintenance questions, call our knowledgeable professionals today at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 28 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Productivity Cloud User Tips Email Software Microsoft Hackers Computer Network Security Hosted Solutions Malware Google Data Business Efficiency Communication Mobile Devices Small Business IT Services Tech Term Hardware IT Support Workplace Tips Internet Managed IT Services Ransomware Cloud Computing Innovation Smartphone Smartphones Upgrade Outsourced IT Backup Data Recovery Android Saving Money Mobile Device Windows 10 Facebook Miscellaneous Users Data Backup Information Windows Microsoft Office Business Management Server Phishing Social Media Business Continuity Cybersecurity Office 365 Browser Managed IT Services Internet of Things Data Management communications Network Windows 10 Passwords Productivity VoIP Gadgets Word Gmail App Vulnerability Remote Monitoring Quick Tips Infrastructure Chrome Apps Managed Service Artificial Intelligence Disaster Recovery Encryption BYOD Settings Managed Service Provider Tip of the week Save Money Analytics Virtual Reality Website Employer-Employee Relationship Access Control Applications VPN Money IT Support Router Unified Threat Management Company Culture Google Drive Display Content Filtering Bandwidth Collaboration Firewall Maintenance Development Apple Employee-Employer Relationship Avoiding Downtime Robot Education Storage YouTube Antivirus Automation Risk Management Networking Office Tips Hacker Data storage Government IT Management Data Security Paperless Office Virtual Private Network Big Data Computers LiFi Social Managed IT Retail Hosted Solution Alert Information Technology Humor Downtime Tablet Data loss Telephone Systems Marketing Administration Mouse Augmented Reality desktop MSP Managing Stress Vendor Management Two-factor Authentication Monitors Chromebook Managed IT Service Customer Relationship Management Scam Document Management Printing Wireless OneNote HIPAA Solid State Drive End of Support Password Remote Workers Break Fix Data Breach Search BDR Windows 7 Mobile Security IT Social Network Hard Disk Drive Software as a Service Laptop SaaS Computing The Internet of Things Business Technology Wi-Fi Outlook Server Management Business Intelligence Spam Bring Your Own Device Holiday Operating System Touchscreen WiFi Virtualization Budget Monitoring Solid State Drives Techology Staff Leominster Dark Data Update Shortcuts Mobile Management Smart Technology Modem FinTech Employee-Employer Relationships Cybercrime How To Lenovo Language Value Payment Card Typing Streaming Processor Statistics Regulations Hybrid Cloud Mail Merge Blockchain IoT Logistics Best Practice Politics Troubleshooting Business Analysis Downloads Mirgation Recycling Current Events iOS Spying National Security VoIP Unified Threat Management K-12 Schools Customer Service Security Cameras Profiles Shortcut Distributed Denial of Service Cookies Digital Payment Office Samsung Analysis Students Firefox Superfish Computing Infrastructure Professional Services Disaster Inventory Cryptocurrency Private Cloud Human Error Memory Bluetooth Comparison Social Networking Digital Scalability Conferencing Address Permissions Star Wars Asset Management Tech Support Google Docs Virus Chatbots eWaste IT solutions Going Green Nanotechnology Updates Halloween User Error Wearable Technology Network upgrade Hacks Managed Services Utility Computing Patch Management Social Engineering Google Wallet Mixed Reality Alerts USB Uninterrupted Power Supply Shadow IT Bitcoin Device Reducing Cost Specifications Motherboard Cables Spyware Migration Consulting Fraud File Sharing Cost Management Memes Business Growth Websites LED Threats Heating/Cooling Multi-Factor Security Identity Computer Care Continuity IBM Screen Reader Charging Legal PowerPoint Scary Stories Time Management Printer Smart Office Laptops Safety Unified Communications Drones Running Cable Licensing Dongle Windows 8 Mobility Batteries Black Friday Identity Theft Wires Emergency Assessment Co-Managed IT Buisness Servers Google Calendar Training Solar Corporate Profile Remote Computing Dark Web Automobile Smart Tech Deep Learning Onboarding GDPR Sports Network Management G Suite Work Network Congestion Mobile Device Management Managed Services Provider Virtual Desktop Slack Hard Disk Drives Cooperation Service Level Agreement Dell Print Toner Myths Cyber Monday Voice over Internet Protocol Messaging Hotspot Internet Exlporer Cabling Holidays Alt Codes Content Huawei Legislation Compliance WannaCry Writing Microsoft Excel Connectivity Google Maps Distribution Digital Signage Data Warehouse SharePoint IT Technicians Optimization Entertainment Vendor Web Server what was your? IT Budget Computer Repair Relocation GPS Mobile Data IT Consultant How To Work/Life Balance Cameras Recovery Meetings Health Tracking Printers Cleaning Black Market Law Enforcement CCTV Notifications Webcam Electronic Medical Records Physical Security Twitter Error Upgrades Gadget Emoji Crowdsourcing Point of Sale Ben McDonald shares Travel Personal Information Botnet Financial Regulation 3D Printing Cortana Supercomputer CrashOverride Processors Motion Sickness Machine Learning Staffing Administrator Unsupported Software Taxes Mobile Computing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3