{"id":1249,"date":"2020-09-16T12:42:51","date_gmt":"2020-09-16T11:42:51","guid":{"rendered":"https:\/\/www.netprimates.com\/?p=1249"},"modified":"2023-08-08T10:09:45","modified_gmt":"2023-08-08T09:09:45","slug":"shadow-it-software","status":"publish","type":"post","link":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/shadow-it-software\/","title":{"rendered":"Shadow IT Software"},"content":{"rendered":"\r\n
Can\u2019t find the font you need? Download it \u2013 for FREE!\u00a0Need to edit a video to send to customers \u2013 there’s an app for that!\u00a0Want to impress with a swanky new type of presentation? Download amazing trial presentation software.\u00a0\u00a0<\/strong><\/p>\r\n\r\n\r\n\r\n Are you familiar with the scenarios above? There\u2019s a need to get something done in a hurry, to look great, or to solve a problem but there isn’t the right software to do it. Simple \u2013 Google it and find an application to download that will solve all your problems effortlessly and often for FREE!\u00a0<\/p>\r\n\r\n\r\n\r\n As we\u2019ve mentioned recently, Shadow IT (the use of\u00a0unauthorised\u00a0IT) can pose significant risks to the security of your business.\u00a0<\/p>\r\n\r\n\r\n\r\n Downloading\u00a0unauthorised\u00a0software onto company laptops and PCs is a familiar and prevalent form of Shadow IT. It\u2019s so incredibly quick to find and download the tool that will save the day. Unfortunately, whilst the day may be saved, the year may be doomed! If that one little piece of software contains a virus the harm wreaked could be devastating.\u00a0<\/p>\r\n\r\n\r\n\r\n Once the virus is on one machine it can then infect others within the network. Passwords could be stolen, data taken for unscrupulous use, files corrupted, email addresses used for spamming and more. There is the potential for high ransoms to be charged for data return, for data to be erased and for hard drives to be permanently damaged. Consequences can be long term, prove costly and risk severe reputational damage.\u00a0<\/p>\r\n\r\n\r\n\r\n Team members that download Shadow IT Software onto company machines rarely undertake it maliciously. If anything, they\u2019re probably trying to impress, save money and be efficient. The keen employee may not wish to get bogged down in what they view as a longwinded paper trail to obtain the software they need. They simply want to get on with the job.\u00a0<\/p>\r\n\r\n\r\n\r\n So, how can you prevent the enthusiastic team member from downloading software from an\u00a0unauthorised\u00a0source?\u00a0\u00a0<\/em><\/strong><\/p>\r\n\r\n\r\n\r\n Explain to new team members why they mustn\u2019t download software without permission, and keep giving the same messages during staff meetings and training sessions. We\u2019d like to reinforce the \u2018why\u2019 element here. Simply forbidding people from doing things without an explanation could be viewed as autocratic. Equally, presenting them with a form filling process for software acquisition may seem bureaucratic. By reinforcing the significant risks and consequences to the business through the use of Shadow IT will ensure teams understand the reasoning behind the processes and procedures needed to obtain new software.\u00a0<\/p>\r\n\r\n\r\n\r\n How will team members go about acquiring the software they need to do their jobs to the best of their ability? Make communication channels as direct and as clear as possible. Ensure team members are listened to when they explain why they need software. If you are in a position to supply what they need \u2013 great! But if you aren\u2019t you need to be clear as to why they can\u2019t have the software and whether there are any plans to acquire it (or similar) in the future.\u00a0<\/p>\r\n\r\n\r\n\r\n To conclude, communication is key to helping prevent Shadow IT. Additionally, we can help. Ask Net Primates about Shadow IT and how it can be prevented.\u00a0<\/p>\r\n\r\n\r\n\r\n You may also advise your teams to\u00a0sign up<\/a>\u00a0for the Net Primates newsletter where we regularly provide information on IT Security, the risks of poor security and how to mitigate against breaches.\u00a0<\/strong><\/p>\r\n\r\n\r\n\r\nSo, where\u2019s the issue?\u00a0<\/h2>\r\n\r\n\r\n\r\n
Why is Shadow IT Software used?\u00a0<\/h2>\r\n\r\n\r\n\r\n
Training is vital.\u00a0\u00a0<\/h2>\r\n\r\n\r\n\r\n
Once the \u2018why\u2019 is clear consider the \u2018how\u2019.\u00a0<\/h2>\r\n\r\n\r\n\r\n