For network managers, merely the thought of unknown or even partly unknown IT infrastructures (opens in new tab) on a network can be enough to send a shiver down the spine. In shadow IT networks, complex infrastructures can develop from everyday practice, without the approval or knowledge of the IT department. These infrastructures can range from manageable hardware environments to complete ERP solutions (opens in new tab) that are in daily use throughout the company – using the data of the official ERP system, but that are in no way accessible to the IT department.
Martin Hodgson is the head of UK and Ireland at Paessler AG.
Independent shadow infrastructures often arise as a result of poor management or planning. If a department is not offered adequate solutions for the work they are tasked to do, or heads of department aren’t educated in the need to work from a centralised enterprise network, the situation may arise where solutions are created from the ground up without proper consultation with the IT department. Much like the creatures in Stranger Things, shadow IT networks can unleash a plethora of risks for networks and unwitting IT departments.
1. Exposed vulnerabilities
This is perhaps the first major risk which comes to mind when we think of unknown infrastructure on the network. Infrastructure that has been set up without the knowledge of the IT department often lacks the required level of endpoint security (opens in new tab) to ensure protection from cyber-attack. In some instances, hardware may be lacking up to date firmware and may even be without a firewall (opens in new tab) or antivirus (opens in new tab). In a world where a network is only as strong as it’s least secured device, this may leave an entire enterprise network vulnerable to attack.
2. Catastrophic data loss
Shadow IT systems and applications run outside of the IT department’s disaster recovery (opens in new tab), backup and restore plan. This can mean that mission critical business functions may be taking place without a back-up solution at all. In the event of an incident, such as a cyber-attack that leads to data loss, crucial company data may disappear entirely without any chance of recovery. In a worst-case scenario this can cause significant damage to company operations with potential for serious financial repercussions.
3. Unsecured data
Even if we ignore the issue of operating without sufficient back up, a shadow IT network may give no overview of potential data access. This means that external service providers, contractors and even former employees may have access to sensitive data. With no permissions overview, there is no way of predicting who can access data and what could be done with it.
4. Inefficient operations
Shadow IT hardware and software is often installed without the requisite testing. Although these systems may directly benefit the individual activities of the installer, this is often a reason for the creation of Shadow IT in the first place, the untested system may slow or even stop other business critical systems on the network. Even in shadow IT networks that run smoothly, double maintenance and administration is required to ensure the system continues to run smoothly in parallel with the official enterprise network.
To state the obvious, the creation of shadow IT processes outside of established IT department protocol will likely violate a company’s IT compliance rules. More seriously however, introduction of shadow IT systems for specialist departments may be a fundamental breach of external regulation such as data protection law. In these instances, breaches of external regulation can lead to large fines from regulators and even company collapse.
Scary stuff, but it doesn’t have to be this way. Thankfully even widespread shadow IT issues can be controlled if the right strategies are put into place by the IT department and senior management. The first step to removing shadow IT systems is being able to locate them. Network visibility is the number one factor leading to the detection and removal of shadow networks. Even well-hidden parallel infrastructure may be detected for example via unusual data traffic readings through a router (opens in new tab) or switch (opens in new tab).
In the end it is up to management to put into place solutions that prevent the creation of parallel networks in the first place. However, with the right tools and enough visibility, IT departments can be well equipped to combat the threat of shadow IT.
Martin Hodgson is the head of UK and Ireland at Paessler AG (opens in new tab).
- Protect your business with the best cloud antivirus (opens in new tab).