Source: Dark Reading Author: Michael Bargury URL: https://www.darkreading.com/cyber-risk/to-map-shadow-it-follow-citizen-developers
-
ONE SENTENCE SUMMARY: Shadow IT emerges when employees utilize unapproved software to improve productivity, posing challenges for enterprise security and management.
-
MAIN POINTS:
-
Shadow IT arises when teams bypass IT for unapproved software solutions.
-
Personal preferences drive employees to use familiar tools despite official options.
-
Larger enterprises face severe software spread due to their size and independence.
-
Security practices can be bypassed through unofficial spending on software licenses.
-
Citizen development allows employees to create custom apps, impacting security dynamics.
-
Unapproved tools can unintentionally facilitate data transfers to unauthorized systems.
-
Mapping shadow IT can help identify what is truly vital for business operations.
-
Just asking employees about their used systems may not yield complete results.
-
Embracing citizen development can enhance visibility into actual software usage.
-
Managing security risks is essential when allowing citizen development practices.
-
TAKEAWAYS:
-
Encourage IT awareness about shadow IT’s prevalence in organizations.
-
Balance employee tool preferences with security measures to mitigate risks.
-
Strategically leverage citizen development for better software visibility.
-
Implement processes to regularly evaluate and manage unapproved software use.
-
Understand that personal efficiency often leads to shadow IT growth.