Source: Dark Reading Author: Michael Bargury URL: https://www.darkreading.com/cyber-risk/to-map-shadow-it-follow-citizen-developers
ONE SENTENCE SUMMARY:
Shadow IT emerges when employees utilize unapproved software to improve productivity, posing challenges for enterprise security and management.
MAIN POINTS:
- Shadow IT arises when teams bypass IT for unapproved software solutions.
- Personal preferences drive employees to use familiar tools despite official options.
- Larger enterprises face severe software spread due to their size and independence.
- Security practices can be bypassed through unofficial spending on software licenses.
- Citizen development allows employees to create custom apps, impacting security dynamics.
- Unapproved tools can unintentionally facilitate data transfers to unauthorized systems.
- Mapping shadow IT can help identify what is truly vital for business operations.
- Just asking employees about their used systems may not yield complete results.
- Embracing citizen development can enhance visibility into actual software usage.
- Managing security risks is essential when allowing citizen development practices.
TAKEAWAYS:
- Encourage IT awareness about shadow IT’s prevalence in organizations.
- Balance employee tool preferences with security measures to mitigate risks.
- Strategically leverage citizen development for better software visibility.
- Implement processes to regularly evaluate and manage unapproved software use.
- Understand that personal efficiency often leads to shadow IT growth.