{"id":10514,"date":"2016-09-27T10:55:03","date_gmt":"2016-09-27T15:55:03","guid":{"rendered":"http:\/\/www.mrc-productivity.com\/blog\/?p=10514"},"modified":"2023-03-13T16:07:09","modified_gmt":"2023-03-13T21:07:09","slug":"5-hidden-costs-of-shadow-it","status":"publish","type":"post","link":"https:\/\/www.mrc-productivity.com\/blog\/2016\/09\/5-hidden-costs-of-shadow-it\/","title":{"rendered":"5 hidden costs of Shadow IT"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-725\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2010\/11\/Education.jpg\" alt=\"Education\" width=\"76\" height=\"100\" \/><span style=\"font-size: 14px;\"><em>Summary: Shadow IT&#8211;a term used to describe unapproved IT systems and solutions used inside organizations&#8211;is growing rapidly. The problem: Not only is Shadow IT more prevalent than most businesses realize, it also costs more than they think. In this article, we explore a few hidden costs associated with Shadow IT and explain why they&#8217;re important. <\/em><\/span><br \/>\n<a name=\"20160926\"><\/a><!--more--><\/p>\n<figure id=\"attachment_7705\" aria-describedby=\"caption-attachment-7705\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-7705\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/03\/shadow-19354_640-300x199.jpg\" alt=\"photo credit: PublicDomainPictures via pixabay cc\" width=\"300\" height=\"199\" srcset=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/03\/shadow-19354_640-300x199.jpg 300w, https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/03\/shadow-19354_640.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-7705\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/pixabay.com\/en\/shadow-lurk-lurker-alley-dark-19354\/\">PublicDomainPictures<\/a> via <a href=\"http:\/\/pixabay.com\/\">pixabay<\/a> <a href=\"http:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">cc<\/a><\/figcaption><\/figure>\n<p>I\u2019ve seen two huge Shadow IT misconceptions floating around recently.<\/p>\n<p>The first misconception: It\u2019s not that widespread. According to one <a href=\"http:\/\/www.informationweek.com\/cloud\/shadow-it-its-much-worse-than-you-think\/a\/d-id\/1321637\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">report<\/span><\/a>, the majority of CIOs underestimate its reach. In fact, the study found the use of Shadow IT was 15-20 times higher than they predicted.<\/p>\n<p>The second misconception: Shadow IT saves time and money. This is a misconception often found on the business side. They see the simplicity and low cost of cloud services, and assume it\u2019s a cost-effective option.<\/p>\n<p>Here\u2019s the problem with that assumption: The costs of Shadow IT go far beyond license costs. Shadow IT includes hidden costs that business leaders don\u2019t recognize until it\u2019s too late. These hidden costs can create problems ranging from lost productivity to millions of dollars of lost revenue.<\/p>\n<p>What are these hidden costs? Today, let\u2019s examine this area in more detail. Here are 5 of the most common hidden costs of Shadow IT.<\/p>\n<h3>1. Security breaches<\/h3>\n<p>The largest potential hidden cost of Shadow IT: Security. The IT department cannot secure data or software if they don\u2019t know it exists. This means they can\u2019t screen new software for security risks or enforce proper security procedures in using the software.<\/p>\n<p>How much does a security breach cost? It depends on whose research you trust. According to one recent <a href=\"http:\/\/www-03.ibm.com\/security\/infographics\/data-breach\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">survey<\/span><\/a>, the average total cost of a security breach is $4 million. According to a different <a href=\"http:\/\/www.zdnet.com\/article\/were-told-data-breaches-cost-millions-on-average-but-this-security-study-disagrees\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">study<\/span><\/a>, the average cost of a data breach was \u201conly\u201d $200,000.<\/p>\n<p>Let\u2019s ignore the large gap between those two numbers, and focus on one area everyone can agree on: No business wants to lose $200,000 fixing a security breach.<\/p>\n<p>How can Shadow IT lead to a security breach? Typically, it happens in one of two ways. Either the users adopt vulnerable software, or (more commonly) they use secure software in unsecure ways. What problems can it cause? As explained below, these risks can create a number of different (and costly) security risks.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\u201cShadow IT can incur a massive security risk, as shadow IT does not necessarily connect via the campus intrusion detection, authentication procedures, or connect to their virtual private network,\u201d says <a href=\"http:\/\/anthonyrhoward.org\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">Anthony R. Howard<\/span><\/a>, Bestselling Author and IT Consultant. \u201cIt can leave an organization vulnerable to ransomware, where a hacker (sometimes novice) seizes and encrypts your data so you can not access it, then charges you an enormous fee to get access to it again. It causes issues with downtime as shadow IT usually does not get backed up reliably so if there is a large failure, data is lost with no way of recovering it, costing the organization serious money if detail like sales, client data and ship-to addresses, or marketing campaigns or database info was on the server (as shadow IT isn\u2019t replicated.)\u201d<\/p><\/blockquote>\n<h3>2. Investing time\/money into the wrong solution<\/h3>\n<p>When the IT department purchases software, they follow a strict selection process. It must meet set requirements for security, integration, license costs, and more.<\/p>\n<p>When users purchase software, they don\u2019t follow the same criteria. They\u2019re looking for a solution to meet their immediate needs. Users don\u2019t typically plan for integration, scalability, or security.<\/p>\n<p>The problem is, the lack of a standard selection process hurts the users in the long run. They often run into unforseen issues with the solution. Maybe it doesn\u2019t meet all of their needs perfectly, or maybe it doesn\u2019t integrate with other tools. The result: Many realize too late that they\u2019ve invested time and money into the wrong solution.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\u201cIn many cases the choice of the product or service the department chooses is not the right solution for them,\u201d says Ahmed Amin, Founder of <a href=\"http:\/\/www.gurusquad.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">Guru Squad<\/span><\/a>. \u201cThis is likely because they did not conduct proper evaluation of the system. This can become much more significant if there is a long term contract or commitment to professional services where they migrate the data.\u201d<\/p><\/blockquote>\n<h3>3. Overpaying for licenses<\/h3>\n<figure id=\"attachment_7708\" aria-describedby=\"caption-attachment-7708\" style=\"width: 240px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7708\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/03\/small_6757849129.jpg\" alt=\"photo credit: 401(K) 2013 via photopin cc\" width=\"240\" height=\"180\" \/><figcaption id=\"caption-attachment-7708\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/401kcalculator.org\">401(K) 2013<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/\">cc<\/a><\/figcaption><\/figure>\n<p>Communication is a common problem among business departments. Oftentimes, different departments operate in their own worlds.<\/p>\n<p>With Shadow IT, communication becomes an even bigger issue. Because Shadow IT is practiced on the sneak, different departments won\u2019t tell others about the third party solution they\u2019re using&#8230;even if it could help others.<\/p>\n<p>This creates two problems:<\/p>\n<p>First, this lack of communication can easily result in extra costs for the business. For instance, multiple departments could be licensing the same solution without anyone knowing. They\u2019re stuck paying duplicate license fees because each department is doing their own thing.<\/p>\n<p>Secondly, the users will generally pay far more per-license than they would going through the IT department.<\/p>\n<p>How so? Let me explain.<\/p>\n<p>When negotiating per-user license costs, a business will typically receive a bulk discount based on the number of users they license. They can negotiate a much lower per-user fee than a typical user purchasing a single license.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\u201cWhen every business unit in the company is downloading their own 3rd party cloud application or signing agreements with a public cloud provider like Amazon Web Services, the company loses its ability to collectively bargain on a better rate for these services,\u201d says Tad Gralewski, VP of Cloud and Managed Services at <a href=\"http:\/\/www.gomindsight.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">Mindsight<\/span><\/a>. \u201cThe company as a whole has the potential to negotiate with public cloud providers to receive necessary storage and compute space at an overall lower cost than if purchased individually. In a Shadow IT environment, that means that individual departments are stuck paying the premium for the same serves. If you extrapolate that across an entire company, the amount of money needlessly wasted inflates to debilitating levels.\u201d<\/p><\/blockquote>\n<h3>4. Network costs<\/h3>\n<p>Depending on its usage, Shadow IT can create a strain on your network. When multiple users access their favorite applications on the company network, problems can arise.<\/p>\n<p>What kind of problems? Most importantly, critical functions can get squeezed out. Unexpected network traffic can hurt performance of important services and applications. Then, the IT department must waste their time trying to find the culprit behind the network slowdown.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\u201cThe increased network demand placed upon network systems due to IoT via Shadow IT, must be considered as a possible \u201ccost\u201d of shadow IT,\u201d says Tim Kittila, Director of Data Center Strategies at <a href=\"http:\/\/ptnet.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">Parallel Technologies<\/span><\/a>. \u201cOne aspect of the IoT is the demand for more information via network connectable devices. The new demand on internal networks due to IoT can cause a lot more noise on the network than was originally anticipated. Let alone opening themselves to a huge security vulnerability, this demand also chews up valuable pipeline and bandwidth and may end up causing issues with end-user application experience for tried and true business applications that are driving the business. These additional IoT items can end up costing the business in operational expense beyond the business case, if built through the course of Shadow IT.\u201d<\/p><\/blockquote>\n<h3>5. The costs of fighting Shadow IT<\/h3>\n<figure id=\"attachment_9132\" aria-describedby=\"caption-attachment-9132\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-9132\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/05\/romans-342413_640-300x168.jpg\" alt=\"photo credit: s2dent via pixabay cc\" width=\"300\" height=\"168\" srcset=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/05\/romans-342413_640-300x168.jpg 300w, https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/05\/romans-342413_640.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-9132\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/pixabay.com\/en\/romans-romans-legionaries-342413\/\">s2dent<\/a> via <a href=\"http:\/\/pixabay.com\/\">pixabay<\/a> <a href=\"http:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">cc<\/a><\/figcaption><\/figure>\n<p>Many IT leaders view Shadow IT as an \u201cUs vs. Them\u201d problem. The users are putting our data at risk and must be stopped!<\/p>\n<p>As a result, they take countermeasures to limit the spread of Shadow IT. They block certain websites. They put limits on software features. They set up scanning software to spot Shadow IT.<\/p>\n<p>Meanwhile, the users spend their time trying to bypass these restrictions. They think IT is just trying to get in their way, and seek out ways to avoid them.<\/p>\n<p>The problem with treating Shadow IT as a battle: It\u2019s costly, whether you recognize it or not.<\/p>\n<p>It\u2019s an efficiency drain on the IT department, as they\u2019re constantly setting up countermeasures to stop Shadow IT. Also, as explained below, it\u2019s an efficiency drain on the users, as many of these countermeasures create barriers in their day-to-day tasks.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\u201cWhen central IT organizations try to stop Shadow IT, they spend a lot of time introducing barriers for other business units to use their own solutions,\u201d says Ben Brearley, IT Project Manager and founder of <a href=\"http:\/\/www.thoughtfulleader.com\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">ThoughtfulLeader.com<\/span><\/a>. \u201cThey also spend time running around trying to spot instances of Shadow IT and shut it down or work with the business units. In some cases, they may even introduce technological hurdles that business units can&#8217;t overcome, such as disabling the use of spreadsheet macros or Access Databases throughout the organization. This can actually make business units less efficient than they would normally be as they try to get work done without access to some potentially useful tools.\u201d<\/p><\/blockquote>\n<p>Here\u2019s the big question: As an IT department, what can you do? If you know that users are practicing Shadow IT in your organization, what can you do besides fight it? While it\u2019s a topic <a href=\"https:\/\/www.mrc-productivity.com\/blog\/2016\/07\/6-ways-to-reduce-shadow-it-security-risks\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">covered in this article<\/span><\/a>, much of the answer boils down to a couple of important tips.<\/p>\n<p>First, figure out why it\u2019s happening. What are the users trying to accomplish that they can&#8217;t\/don&#8217;t get from IT?<\/p>\n<p>Second, give them controlled, self-service options to meet their needs. We\u2019ve seen <a href=\"https:\/\/www.mrc-productivity.com\/blog\/2016\/07\/citizen-development-101-understanding-the-basics\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">citizen development<\/span><\/a> tools grow in popularity over the last few years&#8211;in large part as a response to Shadow IT. The IT department can provide users with self-service development tools, yet still control data and user access. It&#8217;s the best of both worlds. The users get what they want, and the IT department retains control.<\/p>\n<h3>Summary<\/h3>\n<p>While the list could certainly be longer, these are just 5 hidden costs of Shadow IT. Would you add anything to this list? If you would like to add anything to this list, I\u2019d love to hear it. Feel free to share in the comments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: Shadow IT&#8211;a term used to describe unapproved IT systems and solutions used inside organizations&#8211;is growing rapidly. The problem: Not only is Shadow IT more prevalent than most businesses realize, it also costs more than they think. In this article, we explore a few hidden costs associated with Shadow IT and explain why they&#8217;re important.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","slim_seo":{"title":"5 hidden costs of Shadow IT - mrc&#039;s Cup of Joe Blog","description":"Summary: Shadow IT--a term used to describe unapproved IT systems and solutions used inside organizations--is growing rapidly. The problem: Not only is Shadow I"},"footnotes":""},"categories":[8],"tags":[77],"class_list":["post-10514","post","type-post","status-publish","format-standard","hentry","category-education","tag-shadow-it"],"_links":{"self":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/10514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/comments?post=10514"}],"version-history":[{"count":10,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/10514\/revisions"}],"predecessor-version":[{"id":14665,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/10514\/revisions\/14665"}],"wp:attachment":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/media?parent=10514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/categories?post=10514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/tags?post=10514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}