Shadow IT: A Business Risk or Competitive Advantage? - Security Boulevard

Shadow IT: A Business Risk or Competitive Advantage?

A new report was released this past week by Entrust Datacard, and I found the results to be surprising, thought-provoking and requiring action.    

The research is titled: The Upside of Shadow IT: Productivity Meets IT Security. The report outlines how implementing solutions that let your employees own their work experience can lead to increased productivity, improved employee retention and greater trust in leadership.   

Why was I intrigued?

The report has an interesting mix of good and bad news for enterprises. While it lays out both benefits and drawbacks to shadow IT and new (unauthorized and unmanaged) technology showing up at work, the headlines focus more on the positive aspects of shadow IT and encourage openness.  

The report touches on the power of innovation, creativity and new devices under the Internet of Things (IoT) umbrella.  

Here are some of the key findings:

  • Empowering employees to use their preferred tools can deliver long-term benefits
    IT teams recognize the rise in Shadow IT suggests employees want better ways to work. 77 percent of IT employees surveyed believe that their organizations could earn an edge over competitors if company leaders were more collaborative about finding solutions to Shadow IT needs from both IT and non-IT employees.
  • Ignoring employee requests drives more Shadow IT
    Slow IT approval processes can frustrate employees and lead them to introduce even more security risks to organizations. Only 12 percent of the IT departments surveyed follow up on all employee requests for new technologies.
  • What risk? Communicating the risk and consequences of Shadow IT is critical
    Although IT departments are aware of the security risks of Shadow IT to their organizations, most employees are not. More than one-third (37 percent) of the IT employees say their organization does not have clearly outlined internal consequences for (Read more...)

*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: