Uploaded by lawrenzovic

Information technology

advertisement
Slide 1: What is Shadow IT?

Shadow IT is using fact technology systems, applications, software, services, and
devices.

Shadow IT has grown in recent years.

It can drive innovation and enhance efficiency.

It can introduce severe perils to a firm.

Shadow IT is like a giant that companies fight daily.
Shadow IT is the utilization of information technology devices, services, applications, systems,
and software deprived of explicit IT unit approval. Generally, it has expanded exponentially in
recent periods with the implementation of cloud-founded services and applications. Although
Shadow IT can improve workers’ effectiveness and encourage innovation, it can still initiate
serious security dangers to an organization via possible compliance violations and information
leaks. Therefore, Shadow IT is a giant that corporations strive to eradicate daily. It pushes
companies to execute extreme measures via mitigation.
Slide 2: Why is Technology Vital to the Company

This technology eliminates time wastage.

Shadow IT improves productivity.

It makes work extra efficient.

The technology eradicates the necessity for IT to understand what others are doing.
Shadow IT eradicates time wastage because employees do not need to get approval from the IT
department. For numerous workers, IT approval is a blockage to productivity, particularly when
they can find solutions instantly. This phenomenon shows that Shadow IT improves efficiency.
This technology also helps employees to work more effectively. Still, it eliminates the
requirement for IT unit to understand what their business-side coworkers are doing and what
they need from a fresh software plan.
Slide 3: How the Company Uses the Technology

The company can use Shadow IT to enable its groups react to alterations.

It can allow workers utilize the best tools.

This corporation can use Shadow IT to streamline operations.

The company can utilize the technology to increase productivity.
This corporation can utilize Shadow IT to help its teams respond to modifications in the
evolution of fresh technology and business landscape. Also, the company can use this technology
to permit its workforce apply the excellent tools for their tasks. It can utilize Shadow IT to
streamline IT activities by decreasing the resources and costs needed to procure new assets. The
firm can use this technology to increase efficiency because it helps workers do more by utilizing
applications and tools they are familiar with and like.
Slide 4: Linked Cybersecurity Issues

Shadow IT can cause sensitive information leaking.

It can lead to perils to a company’s internal network infrastructure.

The technology can result in the misuse of resources.

It can lead to non-approved software.
If this company fails to consider Shadow IT measures, it can experience various issues. For
example, it can lead to sensitive data leaking that exposes the corporation. This technology can
also result in substantial peril to the firm’s internal network infrastructure. Still, Shadow IT can
result in the mismanagement of this corporation’s resources because it can possess diverse files
copies in the cloud deprived of its approval. The technology can cause non-approved software
that are scoundrel. This phenomenon poses a risk to the organization.
Slide 5: How to Mitigate these Issues

Educating workers.

Ensuring easy access to resources needed.

Using appropriate operating systems.

Conducting SaaS evaluations.
This company should educate its employees regarding the perils associated with using Shadow
IT because people are the weakest link in cyber securities. It should also ensure workers have
easy access to the resources they require, including attaining them remotely. The organization
should utilize suitable operating systems that workers are comfortable applying in the
workstations. To mitigate these concerns, the firm should perform SaaS assessments, proactively
detecting Shadow IT.
Slide 6: Suggestions for Future Use and Expansion

Creating a Shadow IT policy.

Transforming this technology into a useful and secure tool.

The use of cloud-based applications.

Creating an audit trail.
The company can expand the use of this technology by establishing a Shadow IT policy. This
initiative will assist create protocols for the approval, adoption, and control of fresh software and
hardware within the firm. This organization has an opportunity to change the technology into a
secure and vital resource of tooling, driving disruptive innovation. Still, this corporation can
expand the utilization of Shadow IT by using cloud-founded applications that runs its
information storage and processing logic between diverse systems like server-side and customer
one. To improve the future use of this technology, the company can establish an audit trail
whenever creating compliance policies. This phenomenon will ensure the organization document
every action linked to controlling its Shadow IT.
Slide 7: UMGC Contact Information
Slide 8: Questions

How does Shadow IT look like?
o It consists of unsanctioned hardware and applications.

Why does Shadow IT occur?
o Employees and companies use this technology because of its ease of access.

Why should people avoid Shadow IT?
o It invites hackers everywhere.
Slide 9: References
Klotz, S., Kopper, A., Westner, M., & Strahringer, S. (2019). Causing factors, outcomes, and
governance of Shadow IT and business-managed IT: a systematic literature review.
International Journal of Information Systems and Project Management, 7(1), 5–43.
https://doi.org/10.12821/ijispm070102
Kopper, A., Westner, M., & Strahringer, S. (2020). From Shadow IT to Business-managed IT: a
qualitative comparative analysis to determine configurations for successful management
of IT by business entities. Information Systems and E-Business Management, 18(2), 209–
257. https://doi.org/10.1007/s10257-020-00472-6
Mallmann, G. L., Maçada, A. C. G., & Oliveira, M. (2018). The influence of shadow IT usage on
knowledge sharing. Business Information Review, 35(1), 17–28.
https://doi.org/10.1177/0266382118760143
Download