CLOUDTWEAKS CONTRIBUTOR PROGRAM

Join the CloudTweaks thought leadership contributor program which includes a customized profile, branded identity page, newsletter marketing, social amplification and more...

The program is currently available to consultants, influencers or executive level contributors.

WannaCry North Korea Ransomware Attack

Shadow IT – Threat or Opportunity?

Shadow IT

christoper-rentropShadow IT – sometimes referred to as Stealth IT – describes the usage of IT systems and solutions that are built and used inside businesses and organisations without explicit approval from IT departments and/or management. Fueled by the growth of BYOD policies, Christopher Rentrop, Professor of Informatics at Konstanz University of Applied Sciences, believes it now includes “all applications that are acquired without the IT department’s involvement and whose use is not covered by IT service management”

His definition means the term includes software, cloud apps, workflows and even hardware. While Shadow IT can play an important role in the fields of innovation, research, and development, it also causes problems by frequently failing to adhere to a company’s need for control, documentation, security and reliability.

Compliance

But how much of a threat is the area? Can a company be seriously compromised by unchecked Shadow IT within its walls? We know hardware can be identified by network management tools, but monitoring social media platforms and other cloud-based applications is very difficult. For example, staff can use Facebook or Dropbox to send or publish documents unobserved and pose a compliance risk, while non-approved software and services consume bandwidth, slow networks, and ultimately add to the workload of IT departments. Indeed, half of the IT managers questioned believe that 50 percent of their budget is being eaten up by the management of shadow IT alone.

Some analysts believe that Shadow IT now threatens the very existence of IT departments. They claim that the traditional procurement process is dying, replaced instead by individual departments servicing their own IT needs away from the eyes of the IT departments. Three reasons for this are normally forthcoming; 1) IT departments are slow and cumbersome in terms of action, 2) the IT departments lacks the expertise necessary in certain apps, and 3) the IT department is too expensive and too complex. Research by Gartner suggests that at least 90 percent of all IT spend will be managed outside of the IT department by 2020, with Forrester adding that central IT departments will become largely obsolete.

Current IT Landscape

Rather than posing a problem, it can be argued that this instead represents an opportunity. The reason the traditional procurement processes are dying isn’t the fault of IT departments per se, but because lots of organisations insist on using a method that is 25 years old and out of touch with the current IT landscape. IT departments need to listen to the staff, aiming to become a powerful and forward-thinking force that helps make companies more efficient, effective and profitable.

Staff should not be accused of circumventing IT departments wilfully. Typically they have a problem that they need solving fast. When the world outside the office sees such solutions a download away, it is unrealistic to expect a different, lengthy procedure in work. Such a situation explains the soaring growth of services like Dropbox – emails cannot cope with large attachments, so employees use Dropbox and the problem is solved – with or without the blessing of the IT management.

Shadow IT Infographic: Vanson Bourne

What do you think of Shadow IT, is it a threat to organisations’ internal security, or an opportunity for them to amend and improve their practices? Let us know in the comments below.

Tomorrow we look at the security risks round apps frequently used within the Shadow IT umbrella.

By Daniel Price

Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

The Lighter Side Of The Cloud - Speeding Tickets
The Lighter Side Of The Cloud - The First Cloud App
The Lighter Side Of The Cloud - The Backup Reminder
The Lighter Side Of The Cloud - NYSE
The Lighter Side Of The Cloud - Black Friday Online
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
Will 2018 Be the Year Augmented Reality Moves Outside ‘Pokémon Go’?

Will 2018 Be the Year Augmented Reality Moves Outside ‘Pokémon Go’?

2018 Augmented Reality If you’ve never heard of “Pokémon Go” — or at least never had the concept explained to ...
MarTech’s Fragmented Landscape is Failing Brand Marketers

MarTech’s Fragmented Landscape is Failing Brand Marketers

MarTech’s Fragmented Landscape Mapping the customer journey is one of the biggest strategic shifts currently underway in the marketing industry ...
A Closer Look at the Hidden Costs of Collaboration Solutions

A Closer Look at the Hidden Costs of Collaboration Solutions

The Hidden Costs of Collaboration Solutions Collaboration technology is key to efficient communication and productivity for a dispersed and global ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
Robo-Advisors vs. Financial Advisors: What Do Millennials Prefer?

Robo-Advisors vs. Financial Advisors: What Do Millennials Prefer?

Robo-Advisors vs. Financial Advisors For technology-loving millennials, robo-advisors may seem appealing. With a robo-advisor, a portfolio is managed online by ...
3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have ...
Cloud Monitoring and Data Performance Services

Cloud Monitoring and Data Performance Services

CLOUD PERFORMANCE MONITORING The Dynamic State Of Cloud Performance Monitoring And Evaluation Monitoring and evaluation in cloud computing are essential processes. They determine whether a company’s applications on the cloud are effective, safe, and efficient. They also help eliminate failures in ...
20 Leading Cloud CMS Wordpress Alternatives

20 Leading Cloud CMS WordPress Alternatives

Cloud CMS Wordpress Alternatives Content management systems (CMS) have grown exponentially in recent years. Their number and features have exploded. There are now dozens of cloud CMS Wordpress alternatives for startups and small business. CMS is getting more sophisticated. Website building ...
HTML5 Speed Test

HTML5 Speed Test

HTML5 SPEED TEST SERVICES There is no made-for-all solution when it comes to optimizing a website for speed, and while putting a cloud platform in place is a good start, every cloud startup should ensure that they have an optimization ...
Free Report: "Gartner Report: 2018 CEO Survey"

Free Report: “Gartner Report: 2018 CEO Survey”

Deep discipline is required for digital business. Read the full report to learn how to: Prepare for more deeply disciplined exploitation of the digital business changes ahead, Lock the leadership into winning through digital business, Drive business model changes and ...
10 Prototyping Tools To Help Build Your Startup

10 Prototyping Tools To Help Build Your Startup

Prototyping Tools We are continuing this week by focusing on startup tools, tips and tweaks that will help you build, design, manage and market your way into the cloud based business that you want to be. Last week we offered a ...