{"id":45036,"date":"2020-10-08T13:29:46","date_gmt":"2020-10-08T09:29:46","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=45036"},"modified":"2020-12-22T18:05:30","modified_gmt":"2020-12-22T14:05:30","slug":"shadow-it-risks-and-benefits","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/shadow-it-risks-and-benefits\/","title":{"rendered":"Shadow IT: Risks and Benefits Explained"},"content":{"rendered":"<p>Shadow IT might be the cause of a security breach at many levels, including data breach through an insecure or legacy solution and up to compliance breach due to uncontrolled data movement. In 2019, this concept was in the <a href=\"https:\/\/securityboulevard.com\/2019\/01\/shadow-it-running-rampant-in-many-organizations-despite-security-risks\/\" target=\"_blank\" rel=\"noopener noreferrer\">top 7 list of IT concerns for US companies<\/a>. Hence, in most cases, shadow IT is dangerous and MSPs should do their best either to eliminate it or control it. However, there are a couple of surprising upsides for companies implementing shadow IT. <!--more--><br \/>\nSo, let's dive in to discuss massive risks spiced with minor benefits.<\/p>\n<h2>What Is Shadow IT?<\/h2>\n<p>Shadow IT is the process of adopting IT solutions in the organization - whether software, cloud, or hardware - without aligning these solutions with the official IT strategy of the organization. In other words, any IT-related move that system administrators, the IT department or the managed services provider do not know about. Such moves include:<\/p>\n<ul>\n<li>Any applications installed or used without the MSP\u2019s or IT department\u2019s knowledge, such as conference apps, time-tracking solutions, collaborative solutions, or LOB software, to name a few examples.<\/li>\n<li>Changes in the IT network, like new printers, Wi-Fi routers, etc.<\/li>\n<li>Any unapproved cloud applications that are accessed from the corporate network using corporate credentials.<\/li>\n<li>Accessing the corporate network or corporate applications from insecure locations using remote-desktop protocols.<\/li>\n<li>Unapproved bring-your-own-device policies. Once end users take their phones and tablets home and try to access corporate data using these devices, that becomes a security concern.<\/li>\n<\/ul>\n<h2>The Challenges of Shadow IT for MSPs<\/h2>\n<p id=\"last\">If you ever need to discuss your concerns about shadow IT with your clients, here's a list to help you:<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-e6824cd7-ceb3-465a-9f93-4509b71ce559\" data-portal=\"5442029\" data-id=\"e6824cd7-ceb3-465a-9f93-4509b71ce559\"><span class=\"hs-cta-node hs-cta-e6824cd7-ceb3-465a-9f93-4509b71ce559\" id=\"hs-cta-e6824cd7-ceb3-465a-9f93-4509b71ce559\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/e6824cd7-ceb3-465a-9f93-4509b71ce559\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-e6824cd7-ceb3-465a-9f93-4509b71ce559\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/e6824cd7-ceb3-465a-9f93-4509b71ce559.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<ul>\n<li>Security. There are numerous possible security issues tied to shadow IT, such as: the dangers of unpatched legacy systems, whenever they appear on the network; unauthorized application access to the corporate network; data from untrusted apps that users might install or use; and security holes that are left by users who install solutions without a deep technical understanding of what they are doing.<\/li>\n<li>Collaboration. When different departments within one organization are using different collaboration tools, including applications for meetings, sharing files, managing visual and other assets, there will inevitably be a mess once these departments need to communicate with each other.<\/li>\n<li>Standardization. <a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-to-create-standard-operating-procedures\/\">Standard operating procedures<\/a>, applications, and tools are the basis for streamlined and thought-through operations, which is, in turn, a basis for the overall success of the given business. Moreover, if your clients start using different hardware, you will end up with more overhead in supporting that hardware.<\/li>\n<li>Compliance. Some unapproved IT policies, like bring-your-own-device, may potentially be a compliance danger. If your client falls under any compliance, such as <a href=\"https:\/\/www.msp360.com\/resources\/blog\/hipaa-compliant-cloud-backup\/\">HIPAA<\/a>, FISMA, <a href=\"https:\/\/www.msp360.com\/resources\/blog\/gdpr-and-data-storage\/\">GDPR<\/a>, or other, you should pay additional attention to the devices that end users are using to access corporate data.<\/li>\n<\/ul>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 50%; text-align: center;\">\n<p><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/05\/IT-Security-Assessment-1.png\" alt=\"Whitepaper icon\" \/><\/p>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-6cae84c3-fb62-47b1-a1f2-6744125b00e5\" data-portal=\"5442029\" data-id=\"6cae84c3-fb62-47b1-a1f2-6744125b00e5\"><span class=\"hs-cta-node hs-cta-6cae84c3-fb62-47b1-a1f2-6744125b00e5\" id=\"hs-cta-6cae84c3-fb62-47b1-a1f2-6744125b00e5\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/6cae84c3-fb62-47b1-a1f2-6744125b00e5\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-6cae84c3-fb62-47b1-a1f2-6744125b00e5\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/6cae84c3-fb62-47b1-a1f2-6744125b00e5.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 50%;\">\n<div class=\"call-to-action__title\">IT Security Assessment Checklist<\/div>\n<div class=\"call-to-action__text\">\n<p>Assess vulnerabilities and threats, network security, workspace and equipment security, documentation, and more. The pack includes:<\/p>\n<ul>\n<li>a ready-to-print PDF file<\/li>\n<li>an Excel file to help create a customizable assessment resource<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<h2>The Benefits of Shadow IT<\/h2>\n<p>Surprisingly, there are some benefits for organizations who permit this or that form of shadow IT. For example, whenever users try to solve their issues with new applications and solutions, they become more tech-savvy, so that the number of support calls might decrease slightly. (On the other hand, the increase in support calls regarding the unsupported applications will counterbalance that.)<br \/>\nOne real benefit to this situation is that organizations might sometimes find a better solution, especially in the case of LOB applications which will help their business.<\/p>\n<h2>How MSPs Can Manage Shadow IT<\/h2>\n<p>Here are the best practices in avoiding problems and managing your clients' shadow IT activities:<\/p>\n<ul>\n<li>Provide <a href=\"https:\/\/www.msp360.com\/resources\/blog\/end-user-training-guide-for-msps\/\">end-user training<\/a>. While you may already provide your clients training courses on basic security, solutions, and other topics, include a section about the dangers of shadow IT, such as data breaches, downtime, and compliance issues.<\/li>\n<li>Scheduled audit. Every once in a while, you should carefully inspect your clients' premises, including their <a href=\"https:\/\/www.msp360.com\/resources\/blog\/sysadmins-guide-to-network-mapping\/\">network maps<\/a>, hardware, and application usage.<\/li>\n<li>Monitor suspicious connections. Sometimes, your client's end users might want to access their corporate data from the outside. You should carefully monitor all the incoming connections to spot any build-your-own remote access solutions.<\/li>\n<li><a href=\"https:\/\/www.msp360.com\/resources\/blog\/mobile-device-management-for-msps\/\">Mobile device management<\/a>. If your client\u2019s operations fall under any compliance, you should implement mobile device management software to reduce the chances of unexpected and unapproved data flows.<br \/>\nFind an alternative. Instead of blocking all unwanted applications, try to help your clients to find and incorporate tested and safe applications to fit their needs.<br \/>\nMake changes to your <a href=\"https:\/\/www.msp360.com\/resources\/blog\/msp-agreement-guide\/\">SLA<\/a> and MSA. You should explicitly notify your clients that they are fully responsible for any security breaches that happen due to the use of shadow IT applications or hardware. <!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-b730f1dd-4d6f-4a5a-93ca-b292685139a3\" data-portal=\"5442029\" data-id=\"b730f1dd-4d6f-4a5a-93ca-b292685139a3\"><span class=\"hs-cta-node hs-cta-b730f1dd-4d6f-4a5a-93ca-b292685139a3\" id=\"hs-cta-b730f1dd-4d6f-4a5a-93ca-b292685139a3\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/b730f1dd-4d6f-4a5a-93ca-b292685139a3\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-b730f1dd-4d6f-4a5a-93ca-b292685139a3\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/b730f1dd-4d6f-4a5a-93ca-b292685139a3.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/li>\n<\/ul>\n<h2>Conclusion<\/h2>\n<p>With the growth in the number of web-based and cloud-based applications aimed at solving granular issues, there will be an inevitable growth in shadow IT. So, the time is right to create a comprehensive policy to reduce the possibility of downtime, security breaches, or human failure due to the use of unsupported, untested, or simply build-your-own solutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shadow IT might be the cause of a security breach at many levels, including data breach through an insecure or legacy solution and up to compliance breach due to uncontrolled data movement. In 2019, this concept was in the top 7 list of IT concerns for US companies. Hence, in most cases, shadow IT is [&hellip;]<\/p>\n","protected":false},"author":82,"featured_media":45040,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-45036","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/45036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/82"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=45036"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/45036\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/45040"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=45036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=45036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=45036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}