• HOME
  • MEMBERSHIP
  • IN THE COMMUNITY
  • MARKETPLACE
    • SECURITY PRODUCTS
  • ABOUT US
    • PARTNERSHIPS
    • OUR TEAM
  • NEWS & EVENTS
    • EVENTS
    • PRESS RELEASES
    • BLOG
    • MEDIA OVERVIEW
    • GALLERY
  • TIPS & ADVICE
  • HOME
  • MEMBERSHIP
  • IN THE COMMUNITY
  • MARKETPLACE
    • SECURITY PRODUCTS
  • ABOUT US
    • PARTNERSHIPS
    • OUR TEAM
  • NEWS & EVENTS
    • EVENTS
    • PRESS RELEASES
    • BLOG
    • MEDIA OVERVIEW
    • GALLERY
  • TIPS & ADVICE

The Heads Up: Shadow IT - Light Up The Dark Side

21-August-2017
-
Blog
-
No comments
-
Posted by Tom Lejava

Guest blog by Alex Kurz, Director of Sales Engineering at Censornet.

 

Digital infrastructures can be both a curse and a blessing. They allow us to progress technically and positively influence the way in which we work, but can inevitably make organisations more vulnerable to cyber-attacks and also make it increasingly difficult for IT teams to control. In the ‘digital jungle’, computers, laptops and private mobile devices (BYOD – bring your own device) are used to access both internal data and external cloud applications. However, which external services are being accessed? This is not always obvious to the IT team.

 

Loss of IT control

 

When users find the applications provided by the IT team too much hassle or lacking in functionality, it’s easy to cut through the red tape and deploy apps at will, without the knowledge or approval of the IT team. Just log in, upload, share and it’s done. The question is, who controls it?

Shadow IT presents a major challenge for IT executives. Having very little visibility into where the organisation’s critical data is located, who has access to it, and what security controls are in place poses a hefty risk to the entire organisation.

Shadow IT does however, also have its benefits. Integrating new cloud applications into the workplace can lead to greater innovation and productivity. Employees can use the tools that best serve their tasks. Banning the use of cloud applications can often hinder creativity and do more harm than good.

The reality is that there are very few ways to stop the practice - and there is actually no need to do so. This is not to say that you shouldn’t try to shine as much light as possible into the darkness of the IT landscape. These days, there are technologies available that allow IT teams to easily manage the use of Cloud Apps. For example, CensorNet’s Unified Security System (USS) gives users the freedom to safely use applications in the cloud. It monitors and tracks the use of all cloud applications, even unauthorised ones, when and how they are being used. Cloud Application Control is an element of USS.

This way, IT managers find out about unauthorised but popular cloud applications and have the opportunity to control and approve their use. For example, Dropbox and other file sharing services are not fundamentally dangerous, but some risky features such as uploading or sharing critical business data might need to be strictly controlled.

 

Educate your employees

 

Instead of stoking the fear of hackers, organisations need to acknowledge that everyone, especially their own employees, poses a threat to IT security, intentionally or unintentionally. That’s why in addition to the use of modern security technologies, staff education should always be a top priority. Realising that corporate data can quickly get into the wrong hands via cloud applications and putting processes in place to ensure staff think twice about this is the first step towards improving IT security.

 

Learn more about Censornet here.

 

 

Tags
Cyber Breach
Shadow IT
← PREVIOUS POST
London Digital Security Centre Partners with East Midlands Chamber to Educate SME’s on Digital Security
NEXT POST →
Knowledge Update: 18 August 2017
Categories
  • Blog
  • Press Release
Recent Posts
  • Is your business cyber-ready?
  • You’ve Got Mail: 5 Tips to Secure Your Email
  • #OneReset - What could you really lose in a hack?
  • Here’s what GDPR means for your business!
  • Essential Advice for Small Business Cyber Security
London Digital Security Centre

We are a Not for Profit organisation, launched by the Mayor of London as a joint venture with the Metropolitan Police and City of London Police.

Leave a Comment

Your feedback is valuable for us. Your email will not be published.
Cancel Reply

Please wait...
Submit Comment

Related News

Other posts that you should not miss.
LDSC knowledge update

Knowledge Update: 10 November 2017

10-November-2017
-
Blog

This week’s Knowledge Update talks about how almost 1 in 5 UK organisations are unprepared for a cyber-attack, most organisations run ’out-of-date’ office software and how DDoS attacks …

Read More →
Posted by Tom Lejava
3 MIN READ
LDSC - Cyber Simulation - Aug 2017 - Part 2

Cyber Crisis Simulation

14-August-2017
-
Blog

On Thursday 3 August 2017, we hosted a free Cyber Crisis Simulation breakfast at the University of Greenwich, to prepare SME’s for the day their business is breached …

Read More →
Posted by Tom Lejava
1 MIN READ

The London Digital Security Centre in 2017 - Part 2

19-May-2017
-
Blog

When I wrote my last blog in January, I outlined the work that we were aiming to deliver through the London Digital Security Centre. I now want to update you …

Read More →
Posted by Tom Lejava
8 MIN READ
Twitter Follow
Tweets by LondonDSC
Social Connect
News
  • 18-March-2019
    Is your business cyber-ready?
  • 05-February-2019
    You’ve Got Mail: 5 Tips to Secure Your Email
  • OneReset
    23-October-2018
    #OneReset - What could you really lose in a hack?
Contact Us

Company Number : 09639299
Mail to : [email protected]
Address : One Wood Street, London,
United Kingdom, EC2V 7WS.

Built by Cyber Rescue
Privacy   T & C
Copyright London Digital Security Centre (LDSC) 2017
The Heads Up: Shadow IT - Light Up The Dark Side - London Digital Security Centre
 Logo Header Menu
MENU
  • HOME
  • MEMBERSHIP
  • IN THE COMMUNITY
  • MARKETPLACE
    • SECURITY PRODUCTS
  • ABOUT US
    • PARTNERSHIPS
    • OUR TEAM
  • NEWS & EVENTS
    • EVENTS
    • PRESS RELEASES
    • BLOG
    • MEDIA OVERVIEW
    • GALLERY
  • TIPS & ADVICE