IT administrators are pretty particular about what software is used on the networks they manage. This is not because we have any vested interest in the software itself, it’s because of the inherent reliability of the software they manage. They’ve tested it, they manage it, they know it. When an organization starts dealing with employee-downloaded software–especially if there is no procedure in place to report additions to IT–they can quickly lose control over the network.
The software that isn’t properly vetted (or even reported most of the time) is called shadow IT. Since it’s the IT administrator’s job to oversee the data security and overall effectiveness of your company’s technology deployments, shadow IT can present them with a bunch of risk. IT administrators hate risk. Today, we’ll take you through the good and bad of shadow IT.
Most of the people that work with a computer have been working with similar technology for a long time. While they aren’t IT experts, they know what software works best for them. That experience will often result in them downloading software that hasn’t been approved by their company’s IT department or outsourced IT service vendor. This software, while useful for the user, may be a major problem for an organization, for several reasons.
The main issue is that any software that is downloaded may come with adware, spyware, malware, vulnerabilities, and other nefarious code that can put a business at risk. Worse yet, that software isn’t known to your IT admin, keeping it from the routine maintenance it needs to keep it from being a vulnerability. If your business carries vulnerable software, it can create a breachable hole in your network. So, while you may not see continuous problems, risk is magnified.
What are the risks? Here are a few:
The minute you understand the risks, it becomes clear why IT admins typically don’t like shadow IT at all.
Risky behavior can be a major problem for a business. It can also result in significant reward. According to a study conducted in 2019, there is a shift in the way IT admins are looking at shadow IT. This is mainly the result of organizations looking to improve productivity and to use available capital more effectively. For the detrimental risk shadow IT can bring a company, there is an opportunity to save time and cut costs.
The study, which included 1,000 IT professionals, showed a whopping 77 percent believe embracing shadow IT solutions can help a company innovate quicker than their direct competition. That’s not all.
Effectively, two-fifths of IT admins said shadow IT’s detriments could be ignored. That’s not to say I know any IT administrator that would be totally okay with having unsupported applications on company-owned machines. Not one would deliberately put a gaping hole in their organization’s network to boost productivity.
What they would promote is the use of shadow IT that is brought onto the network through employee-owned devices. This practice is being shown more leniency now more than ever. After all, IT admins can’t possibly be responsible for every piece of software brought onto the network by employees. They bring laptops, and tablets, and smartphones, and IoT devices, and with all those devices, there are bound to be programs IT admins typically wouldn’t want on there, but would accept if it kept decision makers happy and productivity high.
If you would like to learn more about shadow IT, what constitutes shadow IT, or have any other software and maintenance questions, call our knowledgeable professionals today at 866-554-8488.
We recently made the decision to switch IT companies and Bmore Technology offered everything we required. As with any large change, there was some apprehension involved. (more…)More Testimonials
Bmore Technology expands footprint in South Carolina BALTIMORE, MD – December 5, 2018 – Bmore Technology has announced the acquisition of Carolina Phone & Data Services (CPDS). (more…)