Slide 1: What is Shadow IT? Shadow IT is using fact technology systems, applications, software, services, and devices. Shadow IT has grown in recent years. It can drive innovation and enhance efficiency. It can introduce severe perils to a firm. Shadow IT is like a giant that companies fight daily. Shadow IT is the utilization of information technology devices, services, applications, systems, and software deprived of explicit IT unit approval. Generally, it has expanded exponentially in recent periods with the implementation of cloud-founded services and applications. Although Shadow IT can improve workers’ effectiveness and encourage innovation, it can still initiate serious security dangers to an organization via possible compliance violations and information leaks. Therefore, Shadow IT is a giant that corporations strive to eradicate daily. It pushes companies to execute extreme measures via mitigation. Slide 2: Why is Technology Vital to the Company This technology eliminates time wastage. Shadow IT improves productivity. It makes work extra efficient. The technology eradicates the necessity for IT to understand what others are doing. Shadow IT eradicates time wastage because employees do not need to get approval from the IT department. For numerous workers, IT approval is a blockage to productivity, particularly when they can find solutions instantly. This phenomenon shows that Shadow IT improves efficiency. This technology also helps employees to work more effectively. Still, it eliminates the requirement for IT unit to understand what their business-side coworkers are doing and what they need from a fresh software plan. Slide 3: How the Company Uses the Technology The company can use Shadow IT to enable its groups react to alterations. It can allow workers utilize the best tools. This corporation can use Shadow IT to streamline operations. The company can utilize the technology to increase productivity. This corporation can utilize Shadow IT to help its teams respond to modifications in the evolution of fresh technology and business landscape. Also, the company can use this technology to permit its workforce apply the excellent tools for their tasks. It can utilize Shadow IT to streamline IT activities by decreasing the resources and costs needed to procure new assets. The firm can use this technology to increase efficiency because it helps workers do more by utilizing applications and tools they are familiar with and like. Slide 4: Linked Cybersecurity Issues Shadow IT can cause sensitive information leaking. It can lead to perils to a company’s internal network infrastructure. The technology can result in the misuse of resources. It can lead to non-approved software. If this company fails to consider Shadow IT measures, it can experience various issues. For example, it can lead to sensitive data leaking that exposes the corporation. This technology can also result in substantial peril to the firm’s internal network infrastructure. Still, Shadow IT can result in the mismanagement of this corporation’s resources because it can possess diverse files copies in the cloud deprived of its approval. The technology can cause non-approved software that are scoundrel. This phenomenon poses a risk to the organization. Slide 5: How to Mitigate these Issues Educating workers. Ensuring easy access to resources needed. Using appropriate operating systems. Conducting SaaS evaluations. This company should educate its employees regarding the perils associated with using Shadow IT because people are the weakest link in cyber securities. It should also ensure workers have easy access to the resources they require, including attaining them remotely. The organization should utilize suitable operating systems that workers are comfortable applying in the workstations. To mitigate these concerns, the firm should perform SaaS assessments, proactively detecting Shadow IT. Slide 6: Suggestions for Future Use and Expansion Creating a Shadow IT policy. Transforming this technology into a useful and secure tool. The use of cloud-based applications. Creating an audit trail. The company can expand the use of this technology by establishing a Shadow IT policy. This initiative will assist create protocols for the approval, adoption, and control of fresh software and hardware within the firm. This organization has an opportunity to change the technology into a secure and vital resource of tooling, driving disruptive innovation. Still, this corporation can expand the utilization of Shadow IT by using cloud-founded applications that runs its information storage and processing logic between diverse systems like server-side and customer one. To improve the future use of this technology, the company can establish an audit trail whenever creating compliance policies. This phenomenon will ensure the organization document every action linked to controlling its Shadow IT. Slide 7: UMGC Contact Information Slide 8: Questions How does Shadow IT look like? o It consists of unsanctioned hardware and applications. Why does Shadow IT occur? o Employees and companies use this technology because of its ease of access. Why should people avoid Shadow IT? o It invites hackers everywhere. Slide 9: References Klotz, S., Kopper, A., Westner, M., & Strahringer, S. (2019). Causing factors, outcomes, and governance of Shadow IT and business-managed IT: a systematic literature review. International Journal of Information Systems and Project Management, 7(1), 5–43. https://doi.org/10.12821/ijispm070102 Kopper, A., Westner, M., & Strahringer, S. (2020). From Shadow IT to Business-managed IT: a qualitative comparative analysis to determine configurations for successful management of IT by business entities. Information Systems and E-Business Management, 18(2), 209– 257. https://doi.org/10.1007/s10257-020-00472-6 Mallmann, G. L., Maçada, A. C. G., & Oliveira, M. (2018). The influence of shadow IT usage on knowledge sharing. Business Information Review, 35(1), 17–28. https://doi.org/10.1177/0266382118760143