What is ‘Shadow IT’?
Shadow IT refers to the various web tools informally in use within most organisations. These tools are often chosen without reference to IT or to management in general.
They are often used for all the very best reasons. Your colleagues have work to do, and these tools help them, so they get used. You might know about some because there is a subscription charge, but others might be free.
These tools can be anything from simply keeping lists of tasks to do, sharing information or managing workflows, providing newsletter lists, or recruiting staff. Its endless.
There’s all sorts of web pages out there that your people will be finding useful and will be using.
The question is, do you know what is being used on your behalf?
Even more importantly, do you know who’s got access to them? As your staff come and go, do you know to change passwords or reset user accounts to make sure that no one who has left you (maybe even gone to a competitor) is still able to access your confidential data?
Shadow IT is one of the largest threats to data privacy in organisations today. It’s not necessarily because these sites are going to be hacked, although it’s always possible, but it’s because if you don’t know the tools are in use, then there is no way that you can manage them!
The first step to maintaining this data is to identify them, and that’s why you need new tools that are cloud focused.
If you’re still using the same old security tools that you used prior to the cloud, then you are simply not keeping up and we need to talk!
Here’s a story about what happens if you don’t have this under control: Why you need to know all the cloud services that your organisation uses – IT Solutions and Managed Services (new.outsource.co.nz/)
Shadow IT is part of our 10-point cyber-security check list
While there is no single layer of technology that can guarantee you will be safe from hackers, you can reduce your risk by adding layers of protection. How many of our 10-point check list are in place for you?
Security Training and Awareness offer
We are deploying some new tools for our KARE for Security clients. For a limited time we can share these with all our clients to give you and your colleagues some great e-security awareness training. The holiday season is targeted by scammers, they know that employees...
Zero-Trust Networking for real business?
Zero-trust sounds extreme Humans like to trust. We trust everyday as we drive down the street that the people coming the other way will stay in their lane. We trust that the restaurants we visit prepare our food properly and hygienically. We trust that our doctor...
Fact or Fiction? My files are in the cloud, I don’t need to worry about security any more!
If only life were so simple! We have some clients that ask us about file security in the cloud as if the answer is an absolute. Of course it isn't. The cloud is more secure than an on-premise system Assuming we’re talking about a reputable mainstream cloud, the...
Are your back ups keeping up?
Why do we need offsite, air-gapped backups? About ten years ago the age of the tape ended. USB 3 was the nail in the coffin for tapes. Finally we had something that was just as fast, but supported random access. At about the same time, we moved from data backups, to...
Deepscan Antivirus and AntiMalware
We've warned before about vulnerabilities like Spectre and Meltdown. The basic precautions are to keep your Windows, Office and other software completely up to date, and of course keeping your anti-virus current. That’s going to stop most things but lately we’ve seen...
One charging cable to rule them all?
How many old phone chargers do you have tucked away at the back of cupboards? It is such a waste of resources to have all those plastic and metal boxes that you don’t want to throw way, but can’t be sure you will ever use again. Just to make things slightly worse,...
Helping you with Cyber Insurance Audit Forms
Cyber Security Audits are increasingly common. One cause is that we're seeing more boards ask about cyber security posture, and frankly every board needs to be asking about that. The other major prompt we see is when our clients are applying for cyber security...
The 5 questions you will asking about Windows 11
1. What is it? We’ve mentioned before that Microsoft had stated that Windows 10 would be the last version of Windows and it would simply keep being updated. That’s played out well over the last many years, but now we do have a new version – Windows 11. New Windows 11...
Don’t be in the 67,500
It might be our nearest neighbour, rather than us, but its still a good indicator of the trends that we're also seeing in New Zealand. We have to remember that much cyber-crime is still not reported. Whether it's out of embarrassment or commercial sensitivity, we...
Print NIGHTMARE
If you suddenly can't print at work, it might NOT be you! It could be the "PrintNightmare" problem For months Microsoft has been battling to release a reliable update for a problem called “PrintNightmare” that’s been happening since Microsoft released an...








