The Risk of Shadow IT

The Risk of Shadow IT

Cloud-based services are rapidly growing. With new growth comes new challenges, and shadow IT is one area of concern. Shadow IT refers to the use of IT-related hardware—including cloud applications—without the approval of IT or a security group. Specifically, employees have become comfortable with downloading and using cloud applications for work but often do so without involving the necessary IT department. This action can pose security risks such as exfiltration of sensitive data or malware spread throughout the business.

Most organizations have some level of shadow IT; however, the greater this practice’s presence, the more difficult risk management becomes. Organizations must understand why shadow IT occurs, be aware of its types and threats, and know how to mitigate the risks.

Common Reasons Why Shadow IT Occurs

Shadow IT is usually performed by employees looking to complete a specific task they’re struggling with or to help them create work efficiencies. It’s important to mention that it’s rarely the result of malicious intent from an employee. The following are additional common reasons shadow IT occurs:

  • Lack of adequate storage space
  • Lack of tool functionality
  • Inability to share data with third parties
  • Lack of necessary video, messaging or development tools
  • Inability to quickly and efficiently request applications and services through a corporate system

Types of Shadow IT

Two main ways shadow IT can appear within organizations: unmanaged devices and unmanaged services. Understanding the implications of both can help employers convey their risks to employees.

Unmanaged Devices

The most understood area of shadow IT is unsanctioned devices on a network. Any device not configured by an organization will most likely fall under shadow IT. Unsanctioned devices can appear as:

  • Personal devices belonging to employees being used on the core network
  • Equipment that is configured incorrectly
  • Smart devices IT hasn’t approved
  • Servers or Wi-Fi access points being used by employees without prior approval
Unmanaged Services

The less familiar but growing area of shadow IT is shadow cloud services. Shadow cloud services can appear as:

  • Unapproved video or messaging services with no monitoring in place
  • External cloud storage that employees use to share files with third parties without permission
  • Unapproved tools, such as project management services being used as an alternative to those already offered
  • Any third-party tool that could be gathering confidential information

Regardless of the shadow IT type, both pose dangerous threats to organizations.

Threats Posed by Shadow IT

Shadow IT introduces threats not otherwise present within corporate IT. It makes risk management difficult because organizations aren’t aware of what they need to protect. Specific threats posed by shadow IT include:

  • Data theft—Many security features that organizations apply to business devices and services are unlikely to have been applied to shadow IT devices, leaving them vulnerable. Although it’s critical for organizations to protect their data, shadow IT makes this difficult because it’s not possible to know where data is being processed or where it ends up. Ultimately, shadow IT can expose organizations to ransomware threats, legal issues surrounding data, reputational damage and recovery costs.
  • Exploitation of services or devices—Typical risk reduction practices such as firewalls, antivirus software and multifactor authentication are not guaranteed to be in place with shadow IT devices or applications. Organizations risk being exposed to threats from malware, network monitoring and lateral movement when using shadow IT.

Risk Mitigation Strategies

With shadow IT a growing concern, organizations must know how to mitigate related issues now and limit the occurrence of shadow IT in the future. Remember, most instances of shadow IT are not malicious acts from employees but attempts to make their jobs more efficient or to simply get their work done. In fact, most employees have no idea they are putting an organization at risk with shadow IT. To help mitigate the risks of shadow IT, organizations should consider the following guidance:

  • Avoid unnecessary lockdowns of enterprise IT and ensure employees have sufficient devices, software and tools to complete all work duties.
  • Implement simple processes for addressing users’ requests for additional IT solutions and solve them promptly.
  • Create a list of resources or services outside of what is normally accessible and gradually make these available in a controlled and monitored way.
  • Migrate data from unsanctioned services to business-controlled platforms.
  • Adopt video, messaging and cloud services that support employee needs.
  • Allow for open conversations about cybersecurity so employees, managers and the IT team can connect about issues across the organization that need to be addressed.

Overall, each organization should search for solutions that work best for both their employee needs and the business’s security needs.

Did you know that 60% of small and medium businesses don’t survive after a cyber attack? Protect your business with Cyber Insurance, call us at 780.424.2727 or click here to get a quote.