Quite recently, I submitted an assignment on “Shadow IT”. I want to share some of its data with the blog readers.
According to Forcepoint.com , “Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval”. E.g. BYOD, use of cloud services like Dropbox, Google Drive, One Drive etc.
Gartner  predicts that one-third of successful attacks experienced by enterprises will be on their shadow IT resources.
A recent study from EMC  suggests that data loss and downtime cost a total of $1.7 trillion each year due to shadow IT security breaches.
How to avoid Shadow IT?
According to techtarget.com , IT shadow can be avoided using the following;
1. Management perspective
Diligence and awareness are two important management attributes
2. HR and Legal department perspective
Defining penalties for employees who conduct shadow IT activities;
3. IT Team Perspective
Considering deploying shadow IT detection tools.
. https://www.forcepoint.com/cyber-edu/shadow-it, Date of access: 14th Sep, 2022.
. https://www.gartner.com/smarterwithgartner/protect-your-organization-from-cyber-and-ransomware-attacks/, Date of access: 14th Sep, 2022.
. https://track.g2.com/resources/shadow-it-statistics, Date of access: 14th Sep. 2022.
. https://www.techtarget.com/searchcio/tip/6-dangers-of-shadow-IT-and-how-to-avoid-them, Date of Access: 14th Sep, 2022