Dealing Effectively with Shadow IT by Managing Both Cybersecurity and User Needs
Steffi Haag, Andreas Eckhardt
This study analyzes how companies can manage the use of unauthorized technology, known as Shadow IT. Through interviews with 44 employees across 34 companies, the research identifies four common approaches organizations take and provides 10 recommendations for IT leaders to effectively balance security risks with the needs of their employees.
Problem
Employees often use unapproved apps and services (Shadow IT) to be more productive, but this creates significant cybersecurity risks like data leaks and malware infections. Companies struggle to eliminate this practice without hindering employee efficiency. The challenge lies in finding a balance between enforcing security policies and meeting the legitimate technology needs of users.
Outcome
- Four distinct organizational archetypes for managing Shadow IT were identified, each resulting in different levels of unauthorized technology use (from very little to very frequent). - Shadow IT users are categorized into two types: tech-savvy 'Goal-Oriented Actors' (GOAs) who carefully manage risks, and less aware 'Followers' who pose a greater threat. - Effective management of Shadow IT is possible by aligning cybersecurity policies with user needs through transparent communication and responsive IT support. - The study offers 10 practical recommendations, including accepting the existence of Shadow IT, creating dedicated user experience teams, and managing different user types differently to harness benefits while minimizing risks.
Host: Welcome to A.I.S. Insights, the podcast at the intersection of business and technology, powered by Living Knowledge. I’m your host, Anna Ivy Summers. Host: Today, we’re diving into a challenge every modern business faces: unauthorized technology in the workplace. We’ll be exploring a fascinating study titled, "Dealing Effectively with Shadow IT by Managing Both Cybersecurity and User Needs." Host: With me is our expert analyst, Alex Ian Sutherland. Alex, thanks for joining us. Expert: It's great to be here, Anna. Host: So, this study analyzes how companies can manage the use of unauthorized technology, known as Shadow IT. It identifies common approaches organizations take and provides recommendations for IT leaders. To start, Alex, what exactly is this "Shadow IT" and why is it such a big problem? Expert: Absolutely. Shadow IT is any software, app, or service that employees use for work without official approval from their IT department. Think of teams using Trello for project management, WhatsApp for quick communication, or Dropbox for file sharing, all because it helps them work faster. Host: That sounds pretty harmless. Employees are just trying to be more productive, right? Expert: That's the motivation, but it's a double-edged sword. While it can boost efficiency, it creates massive cybersecurity risks. The study points out that this practice can lead to data leaks, regulatory breaches like GDPR violations, and malware infections. In fact, research cited in the study suggests incidents linked to Shadow IT can cost a company over 4.8 million dollars. Host: Wow, that’s a significant risk. So how did the researchers in this study get to the bottom of this dilemma? Expert: They took a very direct approach. Over a period of more than three years, they conducted in-depth interviews with 44 employees across 34 different companies in various industries. This allowed them to understand not just what companies were doing, but how employees perceived and reacted to those IT policies. Host: And what were the big 'aha' moments from all that research? What did they find? Expert: They discovered a few crucial things. First, there's no one-size-fits-all approach. They identified four distinct patterns, or "archetypes," for how companies manage Shadow IT. These ranged from a media company with very strict security but also highly responsive IT support, which resulted in almost no Shadow IT, to a large automotive supplier with confusing rules and unhelpful IT, where Shadow IT was rampant. Host: So the company's own actions can either encourage or discourage this behavior. What else stood out? Expert: The second major finding was that not all users of Shadow IT are the same. The study categorizes them into two types. First, you have the 'Goal-Oriented Actors', or GOAs. These are tech-savvy employees who understand the risks and use unapproved tools carefully to achieve specific goals. Host: And the second type? Expert: The second type are 'Followers'. These employees often mimic the Goal-Oriented Actors but lack a deep understanding of the technology or the security implications. They pose a much greater risk to the organization. Host: That’s a critical distinction. So this brings us to the most important question for our listeners. Based on these findings, what should a business leader actually do? What are the key takeaways? Expert: The study provides ten clear recommendations, but I'll highlight three that are most impactful. First, and this is fundamental: accept that Shadow IT exists. You can’t completely eliminate it, so the goal should be to manage it effectively, not just ban it. Host: Okay, so acceptance is step one. What's next? Expert: Second, manage those two user types differently. Instead of punishing your tech-savvy 'Goal-Oriented Actors', leaders should harness their expertise. View them as an extension of your IT team. They can help identify useful new tools and pinpoint outdated security policies. For the 'Followers', the focus should be on education and providing them with better, approved tools so they don't have to look elsewhere. Host: That’s a really smart way to turn a problem into an asset. What’s the final takeaway? Expert: The third takeaway is to listen to your users. The study showed that Shadow IT thrives when official IT is slow, bureaucratic, and unresponsive. The researchers recommend creating a dedicated User Experience team, or at least a formal feedback channel, that actively works to solve employee IT challenges. When you meet user needs, you reduce their incentive to go into the shadows. Host: So, to summarize: Shadow IT is a complex issue, but it’s manageable. Leaders need to accept its existence, work with their savvy employees instead of against them, and most importantly, ensure their official IT support is responsive to what people actually need to do their jobs. Host: Alex, this has been incredibly insightful. Thank you for breaking down this complex topic for us. Expert: My pleasure, Anna. It’s a crucial conversation for any modern organization to be having. Host: And thank you to our audience for tuning in to A.I.S. Insights, powered by Living Knowledge. Join us next time as we uncover more valuable insights from the world of business and technology.
Shadow IT, Cybersecurity, IT Governance, User Needs, Risk Management, Organizational Culture, IT Policy