Don’t be blindsided by cyber attacks

File picture: Kacper Pempel/Reuters

File picture: Kacper Pempel/Reuters

Published Nov 27, 2016

Share

Johannesburg - While many businesses and their IT departments have been reluctant to embrace Shadow IT, it’s time they learn to exist in harmony, as it’s here to stay. Richard Blewitt, sales director at Aptronics, gives an insight to help businesses shine a light on Shadow IT.

If you’ve begun to notice that your employees and certain business departments are bypassing internal IT resources to use their own systems, software and applications, it’s important to know that you’re not alone.

This IT phenomenon, better known as Shadow IT, has grown out of pure necessity, with tech-savvy staff constantly looking for solutions to make their specific roles easier and themselves more productive.

According to Gartner, Shadow IT refers to IT devices, software and services outside the ownership or control of IT organisations.

The fact of the matter is that if an IT department is not providing a solution, employees will find a way to meet their needs on their own.

So, where does this leave businesses? Some would say wide open to security breaches and data loss, while others would say it's the perfect position to adapt.

For some, the time when IT departments had complete control over almost all the technology decisions made within an organisation is but a distant memory. For others, this level of control is only starting to ease up because of the demand for flexibility.

While it has become clear that Shadow IT is now a permanent feature in many businesses, the natural instinct of most IT departments is still to clamp down on these unauthorised downloads. Although security is a major concern - and rightly so - there is no way to bypass Shadow IT altogether. In my experience, the best bet would be for IT professionals to learn to address the fact that it will be around for a long, long time to come.

The maturity of the company and its IT department is a big driver of its overall approach to this demand for freedom when it comes to software solutions. A company that is in the process of streamlining their security capability is more likely to become a victim of cyber attacks than one which has all the right steps, permissions and policies in place to safeguard their network.

Here’s a look at ways to stay ahead of the game to ensure you’re not blindsided when it comes to disruptive technology and software.

Think proactively. Instead of getting caught off guard by new technologies that could improve your business processes, stay ahead and look for new ways your employees may want to use in your work environment.

Streamlining is key. One of the main reasons employees turn to Shadow IT is because it’s a lot faster than going through the organisation’s lengthy processes for approval. Coming up with new processes to fast-track approved technologies is a must.

Set clear boundaries. If there aren’t rules in place, people will take advantage every time. It is up to the IT department to lay out very clear guidelines to show what will and won’t be tolerated.

Budget for flexibility. Too often, IT budgets don’t allow for agility and flexibility, forcing employees to seek out Shadow IT solutions.

When it comes to Shadow IT, if processes are put in place from the get-go, it can be a useful way for your business units to experiment, while improving their capabilities within the proper safety checks.

THE STAR

Related Topics: