• Jump to contents
  • Jump to main navigation
  • Jump to site map
  • News
  • Insight
  • Careers
  • Support
  • Book a Meeting
  • Contact Us Now
  • Book a Meeting
  • Contact Us Now
  • +44 207 837 2444
  • US and International: +1 323 984 8908
  • Change Region
  • +1 323 984 8908
  • Change Region

Cardonet IT Support for Business

Cardonet are a consultative business partner who will work closely with you to provide a transparent, vendor-neutral approach to your IT Services.

+44 203 034 2244
7 Stean Street, London, E8 4ED

+1 323 984 8908
750 N. San Vicente Blvd, Los Angeles, CA 90069

  • Home
  • IT Solutions
    • Industry Sector IT Solutions
      • Hospitality
        • Hotels
        • Hotel Management
        • Restaurants
        • Pub & Bars
      • Finance Associations
      • Manufacturing
      • Media and Creative
        • Marketing Agencies
        • Public Relations and Communications Agencies
        • Design Agencies
        • Advertising Agencies
        • Market Research Agencies
        • Entertainment
      • Charity
      • Education
    • Business IT Challenges
      • Remote and Hybrid Working
      • IT Outsourcing
      • IT Cost Optimisation
      • Office Move and IT Relocation
      • Global Technology Operations
      • Global IT Helpdesk
      • Cyber Security Journey
      • Technology Compliance
      • Multi-site IT Operations
      • GDPR Compliance
      • PCI DSS Compliance
  • IT Services
    • IT Support
      • 24x7 Service Desk
      • 24x7 Network Monitoring
      • IT Service Delivery
      • Proactive IT Support
      • Remote IT Support
      • Onsite IT Support
      • Out of Hours IT Support
      • Dedicated Service Desk
      • Network Support
      • Microsoft Support
      • Apple Mac Support
      • Business IT Support
    • IT Consultancy
      • IT Strategy
      • IT Projects
      • IT Audits
      • Software Licensing
      • IT Infrastructure
      • IT Procurement
      • IT Supplier Management
      • IT Security
      • IT Networks and Cabling
      • Cloud Readiness
      • Virtualisation
      • Backup and Continuity
    • Managed IT
      • Managed Networks
      • Managed Hosting
      • Managed Backups
      • Business Continuity
    • Managed Cloud
      • Private Cloud
      • Hybrid Cloud
      • Public Cloud
    • Communication
      • Onsite Telephone System
      • Hybrid Telephone System
      • Cloud Telephone System
      • Contact Centre
      • Video Conferencing
      • SIP Trunking
      • Lines and Calls
    • Cyber Security
      • Cyber Security Audit
      • Managed Cyber Security
      • Cyber Compliance
  • About
    • About Cardonet
      • Why Cardonet?
      • News
      • Insight
      • Management Team
      • Case Studies
      • Customers
      • Technology Partners
      • Accreditations & Memberships
      • Approach and Culture
      • History
    • Careers with Cardonet
      • Why Cardonet for your Career?
      • Meet our Team
      • Job Entry Options
      • Current Job Vacancies
  • Contact

News

What is Shadow IT and what threats does it pose to your business?

by Rachael / Monday, 21 September 2020 / Published in Cyber Security, Guidance, IT Support
An image with text that says: What is Shadow IT and what threats does it pose to your business?

Shadow IT is the use of IT software and hardware that is managed outside of, and without the knowledge of, your IT Support team.

The risks associated with Shadow IT include:

  • Not knowing where business data is being stored.
  • Cloud apps being used without appropriate security.
  • Not being able to back up or protect what you are not aware of, for example backing up important files that an employee has saved on a USB stick.
  • Find out why you should be thinking about Shadow IT, the threats it poses with remote working and in general, and how to avoid the risks involved with Shadow IT.

In this blog we will cover:

  • What is Shadow IT?
  • Reasons for Shadow IT
  • The risks of Shadow IT
  • How you can avoid Shadow IT risks

What is Shadow IT?

Shadow IT refers to the use of apps and tools by a team or an individual without the knowledge of the IT Support team of the organisation.

As organisations transitioned to remote working due to the COVID-19 pandemic, businesses and employees have had to heavily rely on productivity software and collaboration tools. This has highlighted the need for Software as a Service (SaaS) tools such as Dropbox and Zoom, amongst many others. This raises concern amongst the IT Support team of the organisation as it poses a variety of uncommon cybersecurity risks and a lot more use of Shadow IT.

Research commissioned by Citrix and explored by OnePoll highlighted that Shadow IT is common amongst businesses. The survey results showed that 43% of 7,500 office workers in the UK admitted to the use of unauthorised software. The survey also showed which unauthorised applications were most commonly used, including video conferencing applications and instant messaging software.

Shadow IT is most present when employees need to improvise their processes via unauthorised services or practices which function outside the control of the IT Support team. From a user’s perspective, most cases are seen as harmless, for example storing documents on a personal laptop. However, storing confidential or intellectual data on a personal and unsecured device can become a great risk to business security.

Instances of Shadow IT include:

  • Hardware: servers, PCs, laptops, tablets, and smartphones
  • Cloud services, Software as a service (SaaS): Dropbox, Google Apps, Webex, Microsoft Teams

The most common form of Shadow IT is cloud services, specifically SaaS. The use of SaaS applications has largely grown over the years and is continuing to grow more with remote working.

Shadow IT has its benefits too; it empowers users to quickly and easily use tools to stay productive and collaborate with team members.

Reasons for Shadow IT

Shadow IT is often used without employees realising that they are using it. The reasons this happens can be dealt with quite easily. These are the most common reasons for Shadow IT use:

  • Approved software and services seem to be less effective than alternative products.
  • Approved software is more complicated and uncomfortable to work with than alternative IT Solutions.
  • Approved software is incompatible with the employee’s mobile devices.
  • Employees don’t know about, or don’t understand, the security risks posed by Shadow IT.

One of the main problems is that corporate IT infrastructure operates at a much slower speed than the business and doesn’t always meet its needs. An efficient way of dealing with slow corporate IT infrastructure is by outsourcing your IT Support to an experienced IT Partner.

The risks of Shadow IT

Shadow IT can introduce security risks when unsupported hardware and software are not subject to the same security measures that are applied to supported technologies.

The presence of unknown and unapproved software within enterprise networks creates a lot of problems for IT Support teams, including:

  • Lack of security
  • They are uncontrolled and unmanageable
  • Potential of unused licenses
  • Data loss
  • Compliance issues
  • Lack of Support
  • Financial Issues

Lack of security

Since your IT Support team is unaware of the use of Shadow IT software, they are unable to ensure the security of said software as it does not appear in the organisation’s network.

Uncontrolled and unmanageable

Software vendors constantly release new patches to vulnerabilities and fix errors found in their products. With no knowledge that Shadow IT products are being used, the IT Support team is unable to manage them effectively and run updates.

Potential of unused licenses

Employees may be using a Shadow IT product as a substitute for another product which is already being managed by the IT Support team and most importantly you are already paying a license for, resulting in spending money on tools no one is using.

Data loss

Losing business critical data is probably at the forefront of concerns for most CEOs. When there is Shadow IT products present within your network there is a risk of losing data. If an employee is using an application which does not back up data and something happens to the device they were using, there is a high risk of not being able to retrieve said data. In addition, applications which are not managed by the IT Support team pose a risk of unauthorised access to data as the IT Support team has no control over who is accessing these applications. Furthermore, with unmanaged applications users may have access to business-critical data they are not authorised to access.

Compliance Issues

Shadow IT has the potential of violating compliance requirements for Software Asset Management (SAM) and for the General Data Protection Regulation (GDPR). If you fail to comply with regulations, such as GDPR, you are most likely going to face a very hefty fine that could immensely harm your business.

Lack of Support

Since Shadow IT decreases the visibility of your IT Support team, they are unable to see which tools your users use, resulting in not being able to support these tools when something goes wrong. For example, if your team is using a Shadow IT app which requires an update and it fails, your IT Support team will most likely not know how to deal with this issue.

Financial Issues

Shadow IT brings many problems and an important one is financial issues. You may be spending a lot of money on unused licenses for applications your team are meant to be using but actually use an alternative application. In some cases, your team might even be paying for this alternative tool without your knowledge.

How can you avoid Shadow IT risks?

To avoid Shadow IT risks, you must first understand why employees use Shadow IT products.

Employees don’t usually adopt Shadow IT with bad intentions. The top reason why staff use Shadow IT applications is because they are most likely trying to do their work as quickly and as easily as possible, sometimes in difficult circumstances. Although, there are other reasons employees resort to using shadow IT: they might not have an available approved tool to do a specific task; they were unaware that they should not be using cloud apps without approval; a free trial for an approved app has expired so they find something else to use; they may have requested to use an unapproved app but didn’t get a response so they used it anyway.

So how do you mitigate risks?

Run a Shadow IT survey

To find out what applications your employees are using you will need to run a user survey. Once the results are in, you will need to liaise with your IT Support team to make sure your employees are using the right applications in terms of cyber-security, compliance, integration ability and employee productivity.

The survey will highlight if you are wasting money on software that you might have thought was invaluable, but your users avoid using it because it is difficult to use. Thus, they resort to an easier alternative.

For any Shadow IT tools that you have decided not to implement in your network you should ask employees to close their account and ensure data has been migrated to an approved application. The last thing you want is for your business-critical data to become compromised in a data breach you are not even aware of.

You provide your employees with easy-to-use and reliable software, you lock down machines, and monitor your network (firewall, mdm, rmm).

Develop strong policies

Shadow IT occurs when there is ultimately a failure of communication between employees and management. That is why it is important to have open lines of communication between managers and employees. New hires need to be told what’s acceptable and what is not, and also that there is an open-door policy to better software/cloud ideas. Management needs to know there is a problem if staff feel frustrated in their efforts to do their work.

Therefore, the best prevention of Shadow IT is to adopt a well-considered policy to monitor software and cloud services. Encourage employees to submit ideas for brands and/or types of technology that enhance their job performance and efficiencies. Make careful decisions about adopting these technologies. Then communicate what is – and is not – allowed to staff.

Educate your employees

An effective way of preventing Shadow IT is by educating your users. As an employer, it is in your best interest to educate your staff on the IT risks and dangers of Shadow IT. Employees usually don’t think about the possible consequences of their actions when it comes to Shadow IT; some don’t even know it exists or what it means and logically would not even know what the risks are. By using this preventative approach, you will mitigate most of the Shadow IT in your network. It is equally important to implement this education process in any employee on-boarding for newcomers.

Monitor your network

Your IT Support team or partner is able to implement a networking monitoring strategy which will be able to detect the use of Shadow IT and ultimately keep you safe from a data breach or any harm to your organisation.

Cloud Access Security Broker (CASB)

You can implement a Shadow IT monitoring tool, a Cloud Access Security Broker (CASB), which is designed to keep your cloud applications secure and can detect the use of Shadow IT as well as evaluate cloud applications for risk and compliance.

Give your employees the tools they need

It is also important to consider providing your employees with applications which are familiar to their working habits. Offer users applications that match what they are used to; the familiarity will ensure optimal adoption. For example, implement a file sync-and-share system that extends compliant content services to each desktop in the form of desktop folders. Users are far more likely to comply when they are not learning an entirely new procedure and the organisation can benefit from the instant discoverability and policy management of content services.

In the instance of communication software, which is the most common use of Shadow IT by a large margin, one of the best tools you can use is Microsoft Teams and Outlook. With these tools you can effortlessly create, schedule and join meetings. These solutions also give your IT Support team piece of mind as they are certified secure, with a guaranteed uptime SLA, and integrations for existing technology and core business processes like active directory and mass deployment.

In conclusion

While Shadow IT is an IT security risk, it is also viewed as an indication of an inefficient IT strategy. To eliminate Shadow IT and still have a happy and productive team you need to understand the needs of your employees and provide them with the tools they need or prefer. Whilst the happiness and productivity of your employees is important, it is as important to always consider and eliminate any IT security risks, especially those that are a lower hanging fruit such as Shadow IT.  

It is also important to consider that an agile business must become flexible while controlling risks. IT leaders must be able to identify and mitigate risks posed by unsafe information-handling practices. By following these principles, your business will minimise the risk of Shadow IT and build an IT network that brings value to your IT infrastructure.

Cardonet have been working with businesses in a myriad of sectors for over twenty years. We have helped businesses establish solid IT Strategies and deliver excellent IT Support. We have proudly helped organisations overcome their Shadow IT concerns as well as their technological challenges. Our highly experienced and friendly team of engineers based in Los Angeles, Southern California, the United Kingdom and parts of Europe are available 24/7 to assist you.

We are here to answer any of your questions and address any of your IT concerns as well as ensure you are getting the best IT Support for your business. If you are spending too much time dealing with technology issues and if those issues are affecting your business, call us on +44 203 034 2244 or +1 323 984 8908. Alternately, you can contact us online. We will be happy to help you overcome your IT challenges so that you can set your business apart.

Share this on:

  • LinkedIn
  • Twitter
  • Facebook
Tagged under: Cyber Security, IT Support, Shadow IT

About Rachael

What you can read next

A due diligence checklist for outsourcing your IT
IT Outsourcing due diligence checklist 2021
Access Control Crisis and Managing Identity
The Access Control Crisis: Managing Identity When Teams Double Every Quarter
Why you should discuss compliance and cyber security together.
Cybersecurity and Compliance: The Basics

You must be logged in to post a comment.

Featured Posts

  • how to succeed with ai microsoft 365 copilot

    Beyond the Hype: How to Succeed with AI, from Quick Wins to Total Transformation

  • cloud migration framework

    Cloud migration framework: strategy, execution and what happens after you move 

  • Hotel wifi problems are costing you guests

    Hotel WiFi Problems Are Costing You Guests 

  • Pre-Opening Hotel Checklist

    Hotel IT: The Pre-Opening Technology Checklist 

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • April 2025
  • June 2024
  • April 2024
  • February 2024
  • January 2024
  • October 2023
  • September 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017

Categories

  • Artificial Intelligence
  • Bam's Blog
  • Customers
  • Cyber Security
  • Events
  • GDPR
  • Guidance
  • IT Consultancy
  • IT Support
  • Managed IT
  • Press Release
  • Recruitment
  • Team
  • Uncategorised
  • USA
  • What is

Tags

ai artificial intelligence Business Business Continuity Christmas Christmas Party Cloud Computing Cloud Hosting Compliance coronavirus Covid 19 Cyber Awareness cyber crime Cyber Risk Cyber Security Cyber Threat Data Backups Disaster Recovery GDPR Halloween Hospitality Hotel Hotel IT Services Hotel IT Solutions Hotel IT Support Hotels Hotel Technology IT infrastructure IT Services IT Support Microsoft Microsoft365 Microsoft 365 Copilot Migration Outsourced IT Support Remote Working Security Software Team Team Event Windows 10 Windows 10 End of Life Windows 10 Upgrade Windows 11 Windows 11 Upgrade

Cardonet Twitter

Could not authenticate you.
TOP

We will help you overcome your technology challenges

Call us on +1 323 984 8908, email us at or fill out the following form to start the conversation.

",

For further information on how we process your data, please refer to our Privacy Policy.

IT Solutions

  • IT Solutions by Industry
  • Business IT Challenges

IT Services

  • IT Support
  • IT Consultancy
  • Managed IT
  • Managed Cloud
  • Communication
  • Cyber Security

About

  • Why Cardonet
  • Meet our Team
  • News
  • Insight
  • Case Studies
  • Careers

Contact

  • +44 207 837 2444
  • +1 323 984 8908
  • Change Region
Cardonet 26 years proudly supporting our customer
  •  
  •  
  • 750 N. San Vicente Blvd, Los Angeles, CA 90069
Cardonet IT Support and IT Services
Change Region
  • United Kingdom and Europe
  • United States and International

© 1999 - 2023 All rights reserved.

  • Sitemap
  • Terms and Conditions
  • Privacy Policy
  • GDPR
  • Accessibility Statement
  • Corporate Social Responsibility
  • Environmental Policy
Contact TOP
Cardonet
Cardonet Consultancy Limited 7 Stean Street London, Greater London E8 4ED
London Map +442030342244
Cardonet US Inc 750 N. San Vicente Blvd, West Hollywood Los Angeles, California 90069
Los Angeles Map +13239848908
Home Cardonet IT Support Logo