Post 'Clintongate': 3 Ways to Mitigate Shadow IT

By TechZone360 Special Guest
Asaf Cidon, Co-Founder & CEO, Sookasa
April 01, 2015

No matter what the consequences, people are going to use the technology that is easiest, most trusted, and most familiar to them. 

So it should come as no surprise that even Hillary Clinton relied on her personal email account while performing the duties of Secretary of State. Of course she’s high profile, but her own boss has made no secret of giving presidential preference to a BlackBerry.

What can enterprises learn from 'Clintongate'? The first lesson is that unapproved use of technology within organizations is known as “shadow IT,” and it’s here to stay. 

Employees become familiar with, even devoted to, products and platforms, and you’ll get their Dropbox when you pry it from their cold, dead hands. Because they’re knowledgeable technology users, circumventing security protocols to use consumer products in enterprise environments is rarely a problem. Convenience (or in Clinton’s case, trust), means that the familiar often trumps the secure.

Records retention, legal compliance and business security can all suffer when employees rely on shadow IT. Even when employees attempt encryption, et cetera, the stakes are high--particularly in the public sector. Unfortunately, email is far from the only offender.

Image via Shutterstock

Government enterprises are vulnerable to everything from LinkedIn to Twitter, apps that (may) have legitimate social media marketing and recruitment uses, but that also open the door to attackers. Blocking isn’t the answer: any employee worth their salary knows how to open a Dropbox account using their Gmail address. (A survey by Skyhigh Networks revealed that while IT managers believe they’re blocking 80 percent of Dropbox use, the actual rate is 16 percent.)

Although consumer applications are attempting to increase security, CIOs/CSOs should still seek to bring shadow IT apps into the open and mitigate risks with solutions that are agile and flexible; meeting the needs of the business and its employees.

Here are three ways to mitigate Shadow IT:

  1. Build better safeguards into the tools that workers already use. The past decade has taught us all that employees are not going to adapt to cumbersome and difficult security protocols. This puts the burden on security to become more seamless in the enterprise and in the lives of the employees. Organizations win when they keep the user experience native—establishing stringent security protocols and features within apps that users already employ. Employees continue to go about their business while IT finally retains the levels of security and control the company requires.  

  1. Practice ‘no device left behind.’ Putting the best protection on your infrastructure will amount to naught if your junior accountant loses his unprotected iPhone at a bar, exposing company financials in the process. This cues back to protecting the tools that workers already use. Make sure that a) your security protocols include the main consumer tools and b) that your employees are using those tools on their mobile devices. You can’t stop employees from losing devices, but you can make sure any of the company data on those devices is safe.

  1. Manage permissions. It may seem obvious that IT would want to oversee and adjust permissions for each worker who deals with company data. But not all enterprise products give you full control of permissions; in the age of the mobile worker, this should be a top priority. If we span back to the abandoned iPhone at the bar, an IT admin can simply turn off that worker’s data access, doubly ensuring that nobody can get in.

Can someone please send an email about all that to Mrs. Clinton?

About the Author: Asaf Cidon is the Co-Founder & CEO of Sookasa, a secure platform for sharing data in the cloud.

Edited by Dominick Sorrentino
Related Articles

The World is His Oyster: Connected Solutions Enable Daniel Ward to See Food

By: Paula Bernier    3/16/2018

Fresh seafood can taste great, but if it is not handled properly, people can get sick, and that can lead to business closures and lost revenues. That'…

Read More

How to Get Ready for GDPR if You've Waited Until the Last Minute

By: Special Guest    3/14/2018

With less than two months until the General Data Protection Regulations (GDPR) deadline, many companies have already started making sure that their bu…

Read More

How Fintech is Helping Create Global Businesses

By: Special Guest    3/14/2018

The growth of Fintech probably has not escaped your attention. Whether you're a customer making contactless payments or an investor weighing up CFD tr…

Read More

Are We Prepared for Automation?

By: Special Guest    3/13/2018

We are barreling toward a future of automation. A great proportion of the six million US manufacturing jobs that have disappeared over the last few de…

Read More

The Dark Web - A Hot Bed for Cybercrime

By: Special Guest    3/12/2018

There is a corner of the internet that is cloaked from every day users. Beneath the typical search engines and web browsers, an illegal marketplace is…

Read More