It’s a growing problem: End users are bypassing the IT department, and opting for third-party, cloud-based solutions instead. How prevalent is this issue? According to a recent survey, 71% of organizations say employees are using apps not sanctioned by IT.
Of course, this opens the door for security problems. How can the IT department monitor or secure company data if they don’t even know where it’s stored? How can they avoid security breaches if employees are carrying confidential data around on their personal devices?
How can you address this issue? The automatic reaction for some is full-on war. They want to ban third-party apps, outlaw personal devices, and restrict internet usage. After all, these employees are putting corporate data at risk. They must be stopped! Right?
While I understand the mentality, full-on war is rarely a good approach. Treating users like the bad guys and implementing heavy restrictions will not only waste your time, it will alienate your employees. After all, it doesn’t address the root of the issue: Why are employees bypassing IT in the first place? Do they enjoy breaking the rules? I don’t think so. In fact, I believe they do it because they feel like there’s no other choice.
If you want to control the rise of Shadow IT in your organization, first understand the cause. Learn why employees feel the need to circumvent IT in the first place…and then you’ll better understand how to control (or even harness) it.
So, why do end users bypass the IT department? What can you do about it? To help you answer those questions, we posed them to a few experts in the area, and have compiled their answers below. Here are 7 of the most common reasons why end users bypass the IT department:
7 reasons why end users bypass the IT departmentRead More »