Shadow IT is the use of computing systems, devices, software, applications, and services by employees — without the IT department’s knowledge, guidance, or approval. It covers everything from logging in to personal email accounts from a work PC and installing unapproved apps on a company device to using personal flash drives to store work-related data. Guilty of any of the above? You’re not alone: Everyone does it, and organizations are paying the price. While shadow IT can improve employee productivity and drive innovation, it can also introduce serious security risks no matter how well intentioned.
With more people working from home, IT departments and cybersecurity personnel are scrambling to enforce safety protocols and procedures — and to keep unsanctioned devices and software installations off their networks. Don’t even mention the nightmare of intermingling personal and professional accounts. Even the best protection surrounding your organization's email servers won’t protect against an employee getting phished via their personal email.
Most employees don’t realize how easy it is for a malicious outsider to access company software by embedding an innocent-looking malware link sent to a social media account. A run-of-the-mill flash drive in a backpack may contain proprietary data not permitted to be removed from the confines of the organization, or malware triggered when the drive is connected to a corporate network. On top of the potential damage from a cyberattack, there are also legal repercussions to consider if an employee mishandles sensitive data.
Just staying one step ahead of shadow IT isn’t feasible anymore. By the time a company has shiny new security procedures and processes installed and running, attackers have already poked holes all around them, scraped sensitive data, and moved on to their next mark. By the time end-users catch up, the cycle has already repeated itself. Malware hunting elevates traditional cyber defenses to spot malicious activities before they can do damage.
Effective cybersecurity monitors and analyzes feeds so it can spot a threat by its potential behaviors and remove it through an automated response. And it’s not just limited to external threats: A well-designed system can detect when an insider disrupts their own security measures — intentionally or after falling prey to an attack. It can also be programmed to identify code patterns from known cybercriminal groups. Even if an attack were to be successfully triggered, rapidly understanding the target, source, attack vector and intent helps mitigate the damage.
The laissez-faire approach to personal cybersecurity in a post-pandemic world creates unique challenges for organizations. Fortunately, the latest generation of cybersecurity technology has made huge advances in protecting against the pitfalls of shadow IT.
As with any security structure, even the most advanced system requires maintenance, updates, and consistent testing — but malware hunting (a good offense) will strengthen your defenses against even the most savvy cybercriminals.
Training in best practices and tailoring your cybersecurity focus to your company’s specific risks go a long way in curtailing the most prevalent uses of shadow IT. Consider:
Having IT send fake phishing emails to test employees’ instincts.
Automated monitoring of remote devices for unusual activity
Prioritized use of two-factor authentication access to high risk systems.
The challenge and cost of implementing malware hunting and addressing shadow IT aren’t going to slow down anytime soon, but neither are cybercriminals. Solid surveillance, evolving technology, and — most importantly — keeping yourself and your colleagues educated about the risks of stale cybersecurity measures and careless habits will help even the score.