IT disaster recovery, cloud computing and information security news

Shadow IT - where IT is built and used inside businesses without explicit organizational approval - is becoming increasingly widespread. In fact, Gartner claims that Shadow IT regularly surpasses 30 percent of a company’s IT spend and is the top concern for CIOs in 2016 due to its ability to lead to compliance failures and business risks.

The security issue is unfortunately not only a critical one but a cultural one. When an employee casually uses an application such as Dropbox to transfer files there is likely to be little thought about the risk of potentially sensitive data - whether that is customer contact details, financial information or intellectual property – falling into the wrong hands.

“Shadow IT is here to stay. It is a cultural problem that needs to be addressed. Yet, shutting it down is now impossible; in fact, policies punishing the use of third-party apps would more likely push rogue users deeper into the darkness,” warns Steve Watts, co-founder of SecurEnvoy. “The battle that can be won is to better educate staff and make Shadow IT an integral part of the company’s wider security awareness program.”

When CIOs search for additional security layers to protect sensitive data within an organization, it is best to turn to technologies familiar to their staff. One such example is two factor authentication. The use of the technology has become widespread in the consumer realm, with consumers well versed in how to use two factor authentication and the importance of it to keep their own private data safe from prying eyes.

The latest solutions incorporate near field communication (NFC) – used in Oyster Cards and by Apple Pay – allowing users to simply tap their smart devices to gain access to the information they need.

The good news is that many of the popular shadow IT applications downloaded by staff – such as Dropbox, Skype and TeamViewer – already have the option for two factor authentication. “By not only adopting two factor authentication for all BYOD and work devices, but reminding users to add this layer of security to the applications they are using for their business dealings too, would give IT managers piece of mind and is the answer to Shadow IT that until now has itself resided in the shadows,” adds Watts.

Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.