Use of ‘shadow IT’ in businesses and organisations, weakens security and leaves infrastructure vulnerable – and it’s on the rise.
Find out how, and why it’s important, to detect shadow IT in use by your workforce. As well as the business case for allowing employees to use the technology they feel they need to get their job done.
Have you heard of ‘shadow IT’?
If you don’t know what shadow IT is, read our previous blog explaining all about shadow IT, and some of the stats and security weaknesses it poses for businesses, in The dangers of shadow IT.
In our continuing exploration of shadow IT and the risks it presents to businesses, but also the positives of shadow IT (yes there are some) we look at how to spot shadow IT and what to do to manage and make it viable and safe for your business.
The business case for shadow IT
Use of unsanctioned apps by employees presents significant security weaknesses and challenges for organisations. Increasing cloud usage, exacerbates the use of shadow IT further, putting company data and systems at risk in unsanctioned, unregulated and vulnerable environments.
It’s estimated that up to 50% of organisations’ SaaS (Software as a Service) estate is operating outside of IT protocols and compliance at any one time. However, it’s also the case that employees cite ‘just wanting to do their job’ as a reason for downloading and using their own apps.
Use of own apps shows initiative and productivity
97% of IT professionals say employees are more productive when they’re allowed to use their own, preferred technologies.
Because of the gap in businesses that commonly occurs between the needs of the business and IT departments, shadow IT comes into play as employees under pressure search for new and better ways to get their jobs done.
While unregulated, employees striving for efficiency is to be encouraged, and presents a strong business case for shadow IT being detected and regulated for use as legitimate, security-compliant and safe.
How to find and manage shadow IT
Adopting a shadow IT governance process will help to bring shadow IT into view and under control.
1. Use automated means of discovery
Employee surveys are never going to be accurate, plus they’re time-consuming. Use an automated SaaS management tool, or software asset management tool, to discover what’s actually in your environment.
2. Create an inventory
Create an inventory where you can store data for each application: owner, number of licences, users, spend, renewals, etc. An inventory will help you to assign accountability.
3. Establish risk assessment management
Carry out risk assessments for everything in the inventory, i.e. is the application associated with a security breach? Establish where data is stored, analyse certifications and find out whether the vendors are future proofed. Is there potential for future value / risk for your organisation?
4. Analyse usage
Without data on usage you can’t hope to approach an understanding of ROI (return on investment) in relation to your business functions, or any overlaps in usage, as well as inactive platforms. Use automatic monitoring to gather this data.
5. Rationalise use
You’ll need to define your organisation’s needs and future goals to effectively evaluate and rationalise the shadow IT apps in use. Are they essential, under-used, have potential for the business going forward? Do they genuinely support core workflow and employee efficiency? Can they be safely rolled out and is there value in doing so?
6. Instigate best practice buying and renewals process
Once you’ve established the apps into your compliance and security protocols, and rationalised those that have potential for your business, the process and communication channels around buying, usage and renewal can be implemented, along with employee onboarding.
7. Continuous monitoring and review
Monitoring your network and cloud environment will need to be constant to keep up with policy changes and security breaches. Use automated monitoring and a regular review process to ensure no sensitive data is disclosed to unauthorised sources/vendors, that employees are using applications within compliance and costs are under control.
See shadow IT as an opportunity
Detecting shadow IT for genuine exploration of better, more efficient ways of achieving workflow is a progressive approach organisations can take to bring shadow IT under control. But it must be carried out in accordance with the organisation’s security policy, and with clear protocols for use of any new applications going forward.
For a more technical tutorial on discovering and managing shadow IT apps, view Microsoft’s tutorial on shadow IT.
Alternatively, if you’re concerned about the use of shadow IT in your organisation and need help to being it into control and compliant with your security protocols, get in touch without IT experts today.
< Read more articles on our IT Academy
Business services like IT support, when they work properly, are a true partner to business. Here’s what it’s like when your IT support is a true partner.
If it can happen to McAfee, UNICEF and eBay…
It’s a wake-up call for brands – the SubdoMailing attack sees 8000 household names’ domains hijacked and exploited. Here’s why and how to protect your brand.