While technology has advanced rapidly, people are still hustling everyday to get their work done. Amid this chaos, employees tend to choose an app they are comfortable using to get their work accomplished quickly and efficiently. But if you tell this to a group of IT administrators, watch them sweat. Their minds will start getting clouded with questions such as:
Shadow IT is software, hardware, or services used within an organization that is not known to, or monitored by, the organization's central IT department. It's the equivalent of an employee operating a parallel IT set up with unauthorized resources. The use of shadow IT could easily jeopardize an organization's IT security. When this happens, IT admins are left in the dark, unable to monitor activities, or take required actions.
An employee using Microsoft Outlook, for example, instead of the organization’s approved email application, provides an example of shadow IT.
The gradual adoption of cloud services across organizations has fueled the emergence of shadow IT. According to Brian Lowans, principal research analyst at Gartner, these unsanctioned cloud services purchases are driving increased risks of data breaches and financial liabilities.
Shadow IT is popular among many employees since it circumvents the time-consuming and tedious procedure of waiting for the IT admin’s approval. Shadow IT emerges when employees exercise a preference over the resources they use to complete their work tasks. Employees utilize third-party resources over their organization’s approved resources due to various reasons, including:
Employees might not realize that organizations take appropriate and required precautions to ensure data security during the selection and approval process of the resources approved for use.
According to Gartner, one-third of successful attacks experienced by organizations would be on data located in shadow IT resources.
Here are some of the risks associated with shadow IT:
When employees use third-party resources to accomplish their tasks, they purposefully or unintentionally open the gateway for data exposure. Any confidential data copied or uploaded to these resources cannot be managed since IT admins lack visibility and control over these applications. For example, an employee working on their own financial documents on the same computer they use for work projects might use a preferred shadow IT application. This exposure could make the information in personal financial documents, as well as the information in work-related files, vulnerable to data exposure since the shadow IT application is not registered with, or monitored by the organization's IT security team.
When employees use different technologies and applications for the same general task, the possibility of collaborating with other members is often affected. For example, an accountant who works on Google Sheets will not be able to collaborate easily with another accountant who is using Microsoft Excel.
There are occasions where employees use their personal devices, such as smartphones, laptops, and flash drives, to complete their tasks. This paves the way for threat actors to inject malware and ransomware into these personal devices, establishing the groundwork for infiltrating the organization. Personal devices used in the organization's environment are known as BYOD, which stands for bring your own device. BYOD can also play a vital role in the use of unauthorized devices, leading to shadow IT.
Data handling is strictly controlled in many organizations. Shadow IT allows regulated data to be moved to cloud-based applications and unauthorized systems where IT admins cannot monitor it. This could result in non-compliance, fines, and a loss of trust among investors.
It can be challenging to manage shadow IT, but steps can be taken to reduce the risks. Here are some ways to mitigate shadow IT:
IT admins should conduct surveys and questionnaires to determine whether shadow IT exists within their organization. It is necessary to track what resources remote users are connecting to, and to check if their activity is constantly monitored. Consistent scanning and monitoring of unknown devices, applications, and networks is an efficient way to detect any shadow IT. With AD360, you can monitor Terminal Services to look for unusual remote desktop activity from a critical user account, or discover disconnected remote desktop sessions. You also get complete visibility on RADIUS logon activity. You can secure VPN connections to your organizations' network and resources with multi-factor authentication (MFA).
Employees need to be aware of the consequences that can occur when using unauthorized resources. Regular meetings, virtual or in-person, should be conducted to educate employees about the dangers of shadow IT. To meet the demands of different employees and departments, IT admins can share a list of approved applications, services, and hardware that they can use to complete their tasks.
There are several applications and devices that employees use and not every one of them poses a threat. IT admins need to assess whether the application or device is capable of causing any threat to the organization, and they should be able to take the necessary actions, such as blocking a device that contains malware. IT admins should restrict access to any third-party applications that are prone to risks.
Tackling a problem like shadow IT is not easy, and with an increasing number of employees working from home it becomes even more tricky. There can be hundreds of employees in an organization, and even if one of them doesn’t follow the rules and regulations, they are putting the entire organization at risk. Gartner predicts that by 2025, 50% of large organizations will adopt privacy-enhancing technologies (PET) for processing data in untrusted environments, or multiparty data analytics use cases. PETs incorporate fundamental data protection principles by limiting the use of personal data, strengthening data security, and empowering users. IT admins must ensure that the organization’s security is not compromised by constantly monitoring the employees’ on- and off-network activity, and the use of unauthorized resources.