IT’s reputation as “the department of no” is a tongue-in-cheek recognition of IT workers’ status as the gatekeepers of workplace technology, and their tendency to keep that gate sealed shut. But that status might soon be a thing of the past—if it isn’t already. The rise of remote work, smartphones, and cloud computing technology limit IT departments’ ability to control employee access to software, and to effectively monitor their work activities.
Hence, the corresponding growth of shadow IT in enterprise settings: shadow IT prevalence increased by 59% during COVID, and there’s no reason to expect that trend to reverse. Even if workers believe shadow IT empowers them to complete their assigned job responsibilities more effectively, it nonetheless carries significant cybersecurity risks since IT can’t protect and/or monitor assets it may not know even exist.
“Shadow IT” refers to any hardware, software, or digital activity not controlled and/or sanctioned by an enterprise’s central IT department. Although shadow IT isn’t necessarily malicious by nature, it does pose potential problems in the sense that unapproved and unmonitored applications may create security risks, and result in a portion of the budget wasted on duplicate/unused software licenses.
More than 80 percent of enterprise employees use shadow IT. Workers typically adopt shadow IT for understandable reasons: They might find they complete their work faster and more efficiently when using specific unapproved software platforms or their personal devices. There’s no denying the myriad benefits of Software-as-a-Service (SaaS) applications, but those benefits might not compensate for exposing the business to data breaches or malware.
Examples of shadow IT include:
It is possible to continue benefiting from SaaS apps while simultaneously shoring up your shadow IT control policies. Indeed, a wholly punitive attitude towards shadow IT isn’t advisable: Not only is it virtually impossible to completely restrict employee shadow IT use, doing so would also essentially be throwing out the baby with the bathwater.
It’s far more sensible to align shadow IT with the enterprise’s overall IT infrastructure and policies. Here’s a list of strategies enterprises can employ to reduce the risks of shadow IT, without sacrificing its benefits:
Shadow IT streamlines operations, empowers employees to use the best available tools, and supports an agile work approach. That said, unauthorized use of shadow IT may pose significant risks to an organization's data security, regulatory compliance, and operational integrity. Therefore, it is essential for companies to establish centralized control of any shadow IT solutions.