Combat Shadow IT, a threat more important than it seems

share post

Shadow IT is a problem that all companies in the world face and that can be a threat more important than it appears to be. Each company provides its equipment and programs to its workers, but many of them also download and install other programs that are not supervised by the IT department. According to IBM Security, a third of workers share and upload corporate data to tools outside the organization. That's when he shows up Shadow IT or IT in the shadow, mainly due to cloud storage applications, unauthorized networks, uncontrolled computers or third-party applications such as Saas. Approximately 82% of companies are unaware of all the applications used by their workers on a daily basis. 

PROBLEMS

With teleworking, employees have had to use their own devices that were not supervised by the company and, in the absence of surveillance, they have been able to enter uncontrolled third-party applications. It should be noted that only the 7% of free Internet Saas applications meet minimum standards of security so the people who use them expose the organization without knowing it.

Banks and insurance companies are the organizations most at risk with shadow IT as they cannot send sensitive information through platforms like WeTransfer. It is one of the most used applications for file transfer, but what many people overlook is that everything that is sent is published in the cloud. The information remains fully accessible in the event of cyberattacks and users also face possible sanctions.

IMPACT

This circumstance can cause companies and in particular the CISO, who is the information security supervisor, a puzzle to find the origin of the information leak. Other consequences of Shadow IT are slow processes due to non-consensual tools. In addition to the increased risk in devices that do not share the company's hardware to be cyberattacked. According to studies, approximately 50% of IT budgets are used to solve problems that Shadow IT generates in companies.

HOW TO AVOID IT

To avoid Shadow IT, there are different good practices that the CISO can contribute to the company as identification and monitoring of all the devices and tools that employees will use. In this way, not only is Shadow IT avoided as much as possible, but if there is, it will be easier to find the origin. It is not an easy task but it is necessary. After the risk and suitability analysis, that is, analyze the tools that employees have at their disposal and assess whether they are appropriate. In case they are not, look for new valid tools according to the IT and cybersecurity strategy. Last but not least, it is paramount educate all workers of the importance of information security. It is the weakest link and human error is becoming more and more common in the digital world.

Transfer includes advanced security policies and an easy-to-use admin and user interface. Together with integration with SIEM, Tranxfer also offers traceability reports, so that everything that enters or leaves the perimeter is controlled. It also provides auditing so that the deployment of the tool would be established by adapting and integrating with the characteristics of the environment and the system of each company. We emphasize that all transfers comply with the GDPR regulation. In addition to the technical benefits, the platform has practical benefits.

With Tranxfer you can send files without weight limit, and safely without being public on the network. You also have the possibility of sending a file so that the recipient can only view it with a watermark. Unlike WeTransfer which only has the option to download.  

Contact Tranxfer to enjoy a totally free free trial. You just have to enter www.tranxfer.com

Download the infographic here

You might also be interested in our article Email risks.

More articles