Shadow IT can increase innovation—agree or disagree? Let's hear the reasons behind your answer.
Strongly agree14%
Agree69%
Disagree15%
Strongly disagree2%
Other times? Folks are just wanting shadow IT to silo themselves off. But still, it introduces a topic for conversation. So use it.
More recently it was WebEx and Gensys adoption in the 2000’s
IT can’t be expected to discover everything. Nor expected to support everything. Some investments will stick and others will need to go
Shadow IT is the result of something not working within your normal IT and Operations processes. The supposed increase in innovation will come at a cost against supportability, fractured strategies and security. As suggests it will decrease security posture because shadow IT typically does not conform to the same security standards and is also not being managed for risk and vulnerabilities in an organized way. IMO shadow IT is one of the biggest security risks to any organization.
Thanks Lee! Appreciate your insight
The innovation in what I have seen is less about the technology itself, but more in the ideas that served as the basis of these shadow projects. And some of them can be brillant.
But obviously, lack of proper controls and tech skills often render these projects as major security risks. They also often end up as massive pains to the IT team that will too often have to recuperate and maintain whatever Matt or Jim created in their time off with MS Access or other low code tech after they left the company.
So, yes, there can be innovation in shadow IT, but the cost can be pretty steep if it gets out of control.
Content you might like
Text64%
Audio24%
Video10%
Emojis only!2%
Patch management: to reduce attack surface and avoid system misconfigurations39%
Malware and ransomware prevention: to protect endpoints from social engineering attacks59%
Malware and fileless malware detection and response: to protect against malicious software49%
Threat Hunting: to detect unknown threats that are acting or dormant in your environment and have bypassed the security controls33%
Not planning to change endpoint security strategy9%