Shadow IT is the name given to IT systems that are created within a company without the explicit approval of the management. Often these systems are installed as the result of exasperated staff trying to do their jobs more efficiently. However, these unofficial data flows can be difficult to maintain and pose a higher risk to data security.
In this episode of LokadTV, we learn more about the why’s and the how’s that give way to these systems being created and try to understand what management can do to stop them from becoming harmful to their organisations.
Modern companies are usually staggeringly complex and often come with equally complex systems (CRMs, ERPs etc.) whilst trying to keep up with a technological landscape that just keeps evolving. This quite often means that the finer details of the business end up becoming neglected.
Rather than being a specific Supply Chain challenge, Shadow IT is a phenomenon that can also affect other departments. Despite the fact that many companies invest a lot in their IT departments, often they still end up struggling and lagging behind the needs of their staff. We delve into the potential security implications and the widespread impact that these Shadow IT tools can have on a company.
Yet in a way, Shadow IT can also be considered a double-edged sword. On the one hand, it does show that a company’s employees care about their jobs, that they’re creative and have initiative. On the other hand, it only serves to render the organisation of the company even more complicated, more difficult to maintain and provides a threat to its overall stability.
To wrap things up, we debate to what extent companies are actually aware of the workarounds that their staff are introducing and learn what management can do to dissuade their staff from taking matters into their own hands in this manner. We also discuss that, despite the fact that it’s rooted in technology, Shadow IT can actually be considered a distinctly “human” issue.