About
Subscribe

ITWeb survey examines shadow IT dangers

Staff Writer
By Staff Writer, ITWeb
Johannesburg, 07 Apr 2016

There has never been a better time for IT innovation thanks to cloud computing's flexibility, cost-effectiveness and power.

Today, businesses can deploy, adapt, and remove resources at a previously unthought-of speed, and at an extremely low cost. But it's not without a downside.

There was a time when the technology department had full control of all the IT systems, programmes and infrastructure. No software, or hardware could be used within the business without the full approval of the IT department, and users didn't have the know-how or the resources to get hold of and manage their own technology.

This is no longer the case. Today's reality is the cloud, and unapproved software is downloaded all the time, as staff uncover a new application or device that makes them work more effectively. Too often, the pressure on employees to be productive outweighs any worries about information and requirements.

Nigel Hawthorn, EMEA director of strategy at Skyhigh Networks, describes Shadow IT as technologies deployed by users or departments without explicit organisational approval, often a result of employees finding and downloading cloud applications without the consultation or knowledge of the IT department.

"This has been traditionally seen as a huge threat to corporate security; as not only could it provide a way in for hackers, but sensitive information can cross the corporate boundary via potentially insecure applications without the control or visibility of IT."

On the one hand, we have users embracing a 'BYO' culture, and on the other we have IT departments seeking to regain control. IT want employees to be productive, but not at the cost of loss or other security incidents.

With this mind, ITWeb is introducing the ITWeb Shadow IT Survey, which will take a look at how many cloud services are formally approved by participant organisation, versus how many are actually in use. It will also examine SAAS adoption, and examine the barriers to cloud use within the business. Finally it will examine security around cloud adoption and shadow IT, and will look at policies and procedures in place to secure these technologies.

The results will be presented at the forthcoming ITWeb Security Summit 2016, 17-18 May in Midrand http://www.itweb.co.za/event/itweb/security-summit-2016/?page=home

To take part in the survey, click here.

Share