Story image

Five major risks of letting shadow IT go unchecked

Surely every administrator has heard of shadow IT, and probably many of you admins live in (peaceful) coexistence with these parallel, partly unknown IT infrastructures.

But just for those who might not be familiar with the concept, let's start from scratch.

Shadow IT refers to the hardware and/or software within a company that is not supported by the organisation's central IT department.

The term is often negative because it implies that the IT department has not approved the technology and may not even know that employees are using it at all.

In the field of shadow IT, complex infrastructures arise in everyday practices which are developed and built completely without the IT department - or even around them.

This ranges from manageable hardware environments to complete ERP solutions that are in daily use throughout the company, that are even using the official ERP system’s data, but are in no way accessible to the IT department.

Such independent infrastructures are often a management problem: if specialist departments are not offered adequate solutions and department heads have too much freedom in their IT decisions, situations can arise in which departmental solutions are created from the ground up.

Why is this a problem? Paessler has identified five of the most common risks that can arise from this perfect storm.

1. Cybersecurity

Hardware that is set up within a business department may not be protected by the organisation's IT security systems. There might be no firewall or virus scanner and vital firmware and software updates may not be installed.

This makes the shadow infrastructure, sensitive data, or even the entire company network vulnerable.

2. Data loss

The systems and applications running on shadow IT are very likely not part of the organisation’s backup and restore strategy.

If critical company data is lost in the event of an incident, this means substantial damage with unpredictable consequences for the company.

3. Data security

IT managers will not have an overview of how and when data is being accessed or, more worryingly, who is doing the accessing.

In the worst case, external service providers or former employees still have access to data which could lead to significant data breaches.

4. Inefficiency

Changes to hardware and software within any shadow IT may not undergo any testing.

While directly implemented systems and solutions may accelerate individual processes, due to the lack of testing they may end up stalling a series of other business processes, meaning business-critical IT resources are no longer available.

Shadow IT means double the administration and maintenance effort of systems and software - that’s if any maintenance within the shadow IT environment takes place at all.

5. Compliance

When using shadow IT, processes are often established in those specialist departments that violate the company’s existing compliance rules.

In fact, it is often the case that the introduction and use of shadow IT is already a violation of the usual company compliance rules.

For many companies, such a fundamental breach of compliance rules can threaten their very existence.

JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.