Story image

Five major risks of letting shadow IT go unchecked

Surely every administrator has heard of shadow IT, and probably many of you admins live in (peaceful) coexistence with these parallel, partly unknown IT infrastructures.

But just for those who might not be familiar with the concept, let's start from scratch.

Shadow IT refers to the hardware and/or software within a company that is not supported by the organisation's central IT department.

The term is often negative because it implies that the IT department has not approved the technology and may not even know that employees are using it at all.

In the field of shadow IT, complex infrastructures arise in everyday practices which are developed and built completely without the IT department - or even around them.

This ranges from manageable hardware environments to complete ERP solutions that are in daily use throughout the company, that are even using the official ERP system’s data, but are in no way accessible to the IT department.

Such independent infrastructures are often a management problem: if specialist departments are not offered adequate solutions and department heads have too much freedom in their IT decisions, situations can arise in which departmental solutions are created from the ground up.

Why is this a problem? Paessler has identified five of the most common risks that can arise from this perfect storm.

1. Cybersecurity

Hardware that is set up within a business department may not be protected by the organisation's IT security systems. There might be no firewall or virus scanner and vital firmware and software updates may not be installed.

This makes the shadow infrastructure, sensitive data, or even the entire company network vulnerable.

2. Data loss

The systems and applications running on shadow IT are very likely not part of the organisation’s backup and restore strategy.

If critical company data is lost in the event of an incident, this means substantial damage with unpredictable consequences for the company.

3. Data security

IT managers will not have an overview of how and when data is being accessed or, more worryingly, who is doing the accessing.

In the worst case, external service providers or former employees still have access to data which could lead to significant data breaches.

4. Inefficiency

Changes to hardware and software within any shadow IT may not undergo any testing.

While directly implemented systems and solutions may accelerate individual processes, due to the lack of testing they may end up stalling a series of other business processes, meaning business-critical IT resources are no longer available.

Shadow IT means double the administration and maintenance effort of systems and software - that’s if any maintenance within the shadow IT environment takes place at all.

5. Compliance

When using shadow IT, processes are often established in those specialist departments that violate the company’s existing compliance rules.

In fact, it is often the case that the introduction and use of shadow IT is already a violation of the usual company compliance rules.

For many companies, such a fundamental breach of compliance rules can threaten their very existence.

Why 'right to repair' legislation could be a new lease on life for broken devices
“These companies are profiting at the expense of our environment and our pocketbooks as we become a throw-away society that discards over 6 million tonnes of electronics every year.”
Attacks targeting Cisco Webex extension explode in popularity - WatchGuard
WatchGuard's Internet Security Report for Q4 2018 also finds growing use of a new sextortion phishing malware customised to individual victims.
SAS partners with NVIDIA on deep learning and computer vision
“By partnering with NVIDIA, we combine our strengths to augment human intelligence and realise the true potential of AI.” 
Why businesses must embrace automation to ensure success
“For many younger workers, the traditional view of a steady job at one company, perhaps for life, simply doesn’t reflect reality."
Dropbox invests in hosting data inside Australia
Global collaboration platform Dropbox has announced it will now host Australian customer files onshore to support its growing base in the country.
TYAN unveils new inference-optimised GPU platforms with NVIDIA T4 accelerators
“TYAN servers with NVIDIA T4 GPUs are designed to excel at all accelerated workloads, including machine learning, deep learning, and virtual desktops.”
Worldwide spending on security to reach $103.1bil in 2019 - IDC
Managed security services will be the largest technology category in 2019.
How Cognata and NVIDIA enable autonomous vehicle simulation
“Cognata and NVIDIA are creating a robust solution that will efficiently and safely accelerate autonomous vehicles’ market entry."