{"id":1249,"date":"2020-09-16T12:42:51","date_gmt":"2020-09-16T11:42:51","guid":{"rendered":"https:\/\/www.netprimates.com\/?p=1249"},"modified":"2023-08-08T10:09:45","modified_gmt":"2023-08-08T09:09:45","slug":"shadow-it-software","status":"publish","type":"post","link":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/","title":{"rendered":"Shadow IT Software"},"content":{"rendered":"\r\n

Can\u2019t find the font you need? Download it \u2013 for FREE!\u00a0Need to edit a video to send to customers \u2013 there’s an app for that!\u00a0Want to impress with a swanky new type of presentation? Download amazing trial presentation software.\u00a0\u00a0<\/strong><\/p>\r\n\r\n\r\n\r\n

Are you familiar with the scenarios above? There\u2019s a need to get something done in a hurry, to look great, or to solve a problem but there isn’t the right software to do it. Simple \u2013 Google it and find an application to download that will solve all your problems effortlessly and often for FREE!\u00a0<\/p>\r\n\r\n\r\n\r\n

So, where\u2019s the issue?\u00a0<\/h2>\r\n\r\n\r\n\r\n

As we\u2019ve mentioned recently, Shadow IT (the use of\u00a0unauthorised\u00a0IT) can pose significant risks to the security of your business.\u00a0<\/p>\r\n\r\n\r\n\r\n

Downloading\u00a0unauthorised\u00a0software onto company laptops and PCs is a familiar and prevalent form of Shadow IT. It\u2019s so incredibly quick to find and download the tool that will save the day. Unfortunately, whilst the day may be saved, the year may be doomed! If that one little piece of software contains a virus the harm wreaked could be devastating.\u00a0<\/p>\r\n\r\n\r\n\r\n

Once the virus is on one machine it can then infect others within the network. Passwords could be stolen, data taken for unscrupulous use, files corrupted, email addresses used for spamming and more. There is the potential for high ransoms to be charged for data return, for data to be erased and for hard drives to be permanently damaged. Consequences can be long term, prove costly and risk severe reputational damage.\u00a0<\/p>\r\n\r\n\r\n\r\n

Why is Shadow IT Software used?\u00a0<\/h2>\r\n\r\n\r\n\r\n

Team members that download Shadow IT Software onto company machines rarely undertake it maliciously. If anything, they\u2019re probably trying to impress, save money and be efficient. The keen employee may not wish to get bogged down in what they view as a longwinded paper trail to obtain the software they need. They simply want to get on with the job.\u00a0<\/p>\r\n\r\n\r\n\r\n

So, how can you prevent the enthusiastic team member from downloading software from an\u00a0unauthorised\u00a0source?\u00a0\u00a0<\/em><\/strong><\/p>\r\n\r\n\r\n\r\n

Training is vital.\u00a0\u00a0<\/h2>\r\n\r\n\r\n\r\n

Explain to new team members why they mustn\u2019t download software without permission, and keep giving the same messages during staff meetings and training sessions. We\u2019d like to reinforce the \u2018why\u2019 element here. Simply forbidding people from doing things without an explanation could be viewed as autocratic. Equally, presenting them with a form filling process for software acquisition may seem bureaucratic. By reinforcing the significant risks and consequences to the business through the use of Shadow IT will ensure teams understand the reasoning behind the processes and procedures needed to obtain new software.\u00a0<\/p>\r\n\r\n\r\n\r\n

Once the \u2018why\u2019 is clear consider the \u2018how\u2019.\u00a0<\/h2>\r\n\r\n\r\n\r\n

How will team members go about acquiring the software they need to do their jobs to the best of their ability? Make communication channels as direct and as clear as possible. Ensure team members are listened to when they explain why they need software. If you are in a position to supply what they need \u2013 great! But if you aren\u2019t you need to be clear as to why they can\u2019t have the software and whether there are any plans to acquire it (or similar) in the future.\u00a0<\/p>\r\n\r\n\r\n\r\n

To conclude, communication is key to helping prevent Shadow IT. Additionally, we can help. Ask Net Primates about Shadow IT and how it can be prevented.\u00a0<\/p>\r\n\r\n\r\n\r\n

You may also advise your teams to\u00a0sign up<\/a>\u00a0for the Net Primates newsletter where we regularly provide information on IT Security, the risks of poor security and how to mitigate against breaches.\u00a0<\/strong><\/p>\r\n\r\n\r\n\r\n

\"\"<\/a><\/figure>\r\n","protected":false},"excerpt":{"rendered":"

Can\u2019t find the font you need? Download it \u2013 for FREE!\u00a0Need to edit a video to send to customers \u2013 there’s an app for that!\u00a0Want to impress with a swanky new type of presentation? Download amazing trial presentation software.\u00a0\u00a0 Are you familiar with the scenarios above? There\u2019s a need to get something done in a hurry, to look great, or to solve a problem but there isn’t the right software to do it. Simple \u2013 Google it and find an application to download that will solve all your problems effortlessly and often for FREE!\u00a0 So, where\u2019s the issue?\u00a0 As we\u2019ve mentioned recently, Shadow IT (the use of\u00a0unauthorised\u00a0IT) can pose significant risks to the security of your business.\u00a0 Downloading\u00a0unauthorised\u00a0software onto company laptops and PCs is a familiar and prevalent form of Shadow IT. It\u2019s so incredibly quick to find and download the tool that will save the day. Unfortunately, whilst the day may be saved, the year may be doomed! If that one little piece of software contains a virus the harm wreaked could be devastating.\u00a0 Once the virus is on one machine it can then infect others within the network. Passwords could be stolen, data taken for unscrupulous use, files corrupted, email addresses used for spamming and more. There is the potential for high ransoms to be charged for data return, for data to be erased and for hard drives to be permanently damaged. Consequences can be long term, prove…<\/p>\n","protected":false},"author":2,"featured_media":2799,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[15],"tags":[],"acf":[],"yoast_head":"\nShadow IT Software - Net Primates<\/title>\n<meta name=\"description\" content=\"Shadow IT Software can pose a significant risk to the security of your business. Find out what it is and how you can prevent it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shadow IT Software - Net Primates\" \/>\n<meta property=\"og:description\" content=\"Shadow IT Software can pose a significant risk to the security of your business. Find out what it is and how you can prevent it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/\" \/>\n<meta property=\"og:site_name\" content=\"Net Primates\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netprimates\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-16T11:42:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-08T09:09:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2020\/09\/Newletter-sign-up-lores.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"560\" \/>\n\t<meta property=\"og:image:height\" content=\"304\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"freestyle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netprimates\" \/>\n<meta name=\"twitter:site\" content=\"@netprimates\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"freestyle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/\"},\"author\":{\"name\":\"freestyle\",\"@id\":\"https:\/\/www.netprimates.com\/#\/schema\/person\/83ed91e8f40648c90a65a894b8306d34\"},\"headline\":\"Shadow IT Software\",\"datePublished\":\"2020-09-16T11:42:51+00:00\",\"dateModified\":\"2023-08-08T09:09:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/\"},\"wordCount\":595,\"publisher\":{\"@id\":\"https:\/\/www.netprimates.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2020\/09\/Newletter-sign-up-lores.jpg\",\"articleSection\":[\"IT & Cyber Security Tips\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/\",\"url\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/\",\"name\":\"Shadow IT Software - Net Primates\",\"isPartOf\":{\"@id\":\"https:\/\/www.netprimates.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2020\/09\/Newletter-sign-up-lores.jpg\",\"datePublished\":\"2020-09-16T11:42:51+00:00\",\"dateModified\":\"2023-08-08T09:09:45+00:00\",\"description\":\"Shadow IT Software can pose a significant risk to the security of your business. Find out what it is and how you can prevent it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#primaryimage\",\"url\":\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2020\/09\/Newletter-sign-up-lores.jpg\",\"contentUrl\":\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2020\/09\/Newletter-sign-up-lores.jpg\",\"width\":560,\"height\":304,\"caption\":\"Newsletter sign up screenshot.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.netprimates.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shadow IT Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.netprimates.com\/#website\",\"url\":\"https:\/\/www.netprimates.com\/\",\"name\":\"Net Primates\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.netprimates.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.netprimates.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.netprimates.com\/#organization\",\"name\":\"Net Primates\",\"url\":\"https:\/\/www.netprimates.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.netprimates.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2023\/08\/Net-Primates-organisation-logo.jpg\",\"contentUrl\":\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2023\/08\/Net-Primates-organisation-logo.jpg\",\"width\":1000,\"height\":1000,\"caption\":\"Net Primates\"},\"image\":{\"@id\":\"https:\/\/www.netprimates.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/netprimates\",\"https:\/\/x.com\/netprimates\",\"https:\/\/www.linkedin.com\/company\/net-primates-ltd\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.netprimates.com\/#\/schema\/person\/83ed91e8f40648c90a65a894b8306d34\",\"name\":\"freestyle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.netprimates.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d407275e219c6069a44809530143596a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d407275e219c6069a44809530143596a?s=96&d=mm&r=g\",\"caption\":\"freestyle\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shadow IT Software - Net Primates","description":"Shadow IT Software can pose a significant risk to the security of your business. Find out what it is and how you can prevent it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/","og_locale":"en_GB","og_type":"article","og_title":"Shadow IT Software - Net Primates","og_description":"Shadow IT Software can pose a significant risk to the security of your business. Find out what it is and how you can prevent it.","og_url":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/","og_site_name":"Net Primates","article_publisher":"https:\/\/www.facebook.com\/netprimates","article_published_time":"2020-09-16T11:42:51+00:00","article_modified_time":"2023-08-08T09:09:45+00:00","og_image":[{"width":560,"height":304,"url":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2020\/09\/Newletter-sign-up-lores.jpg","type":"image\/jpeg"}],"author":"freestyle","twitter_card":"summary_large_image","twitter_creator":"@netprimates","twitter_site":"@netprimates","twitter_misc":{"Written by":"freestyle","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#article","isPartOf":{"@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/"},"author":{"name":"freestyle","@id":"https:\/\/www.netprimates.com\/#\/schema\/person\/83ed91e8f40648c90a65a894b8306d34"},"headline":"Shadow IT Software","datePublished":"2020-09-16T11:42:51+00:00","dateModified":"2023-08-08T09:09:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/"},"wordCount":595,"publisher":{"@id":"https:\/\/www.netprimates.com\/#organization"},"image":{"@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2020\/09\/Newletter-sign-up-lores.jpg","articleSection":["IT & Cyber Security Tips"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/","url":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/","name":"Shadow IT Software - Net Primates","isPartOf":{"@id":"https:\/\/www.netprimates.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#primaryimage"},"image":{"@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2020\/09\/Newletter-sign-up-lores.jpg","datePublished":"2020-09-16T11:42:51+00:00","dateModified":"2023-08-08T09:09:45+00:00","description":"Shadow IT Software can pose a significant risk to the security of your business. Find out what it is and how you can prevent it.","breadcrumb":{"@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#primaryimage","url":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2020\/09\/Newletter-sign-up-lores.jpg","contentUrl":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2020\/09\/Newletter-sign-up-lores.jpg","width":560,"height":304,"caption":"Newsletter sign up screenshot."},{"@type":"BreadcrumbList","@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.netprimates.com\/"},{"@type":"ListItem","position":2,"name":"Shadow IT Software"}]},{"@type":"WebSite","@id":"https:\/\/www.netprimates.com\/#website","url":"https:\/\/www.netprimates.com\/","name":"Net Primates","description":"","publisher":{"@id":"https:\/\/www.netprimates.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.netprimates.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.netprimates.com\/#organization","name":"Net Primates","url":"https:\/\/www.netprimates.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.netprimates.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2023\/08\/Net-Primates-organisation-logo.jpg","contentUrl":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2023\/08\/Net-Primates-organisation-logo.jpg","width":1000,"height":1000,"caption":"Net Primates"},"image":{"@id":"https:\/\/www.netprimates.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netprimates","https:\/\/x.com\/netprimates","https:\/\/www.linkedin.com\/company\/net-primates-ltd\/"]},{"@type":"Person","@id":"https:\/\/www.netprimates.com\/#\/schema\/person\/83ed91e8f40648c90a65a894b8306d34","name":"freestyle","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.netprimates.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d407275e219c6069a44809530143596a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d407275e219c6069a44809530143596a?s=96&d=mm&r=g","caption":"freestyle"}}]}},"_links":{"self":[{"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/posts\/1249"}],"collection":[{"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/comments?post=1249"}],"version-history":[{"count":0,"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/posts\/1249\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/media\/2799"}],"wp:attachment":[{"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/media?parent=1249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/categories?post=1249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/tags?post=1249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}