{"id":11021,"date":"2017-09-06T10:55:42","date_gmt":"2017-09-06T15:55:42","guid":{"rendered":"http:\/\/www.mrc-productivity.com\/blog\/?p=11021"},"modified":"2023-06-23T16:59:44","modified_gmt":"2023-06-23T21:59:44","slug":"5-reasons-end-users-bypass-department","status":"publish","type":"post","link":"https:\/\/www.mrc-productivity.com\/blog\/2017\/09\/5-reasons-end-users-bypass-department\/","title":{"rendered":"5 (more) reasons why end users bypass the IT department"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-725\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2010\/11\/Education.jpg\" alt=\"Education\" width=\"76\" height=\"100\" \/><span style=\"font-size: 14px;\"><em>Summary: \u201cShadow IT\u201d is a term used to describe IT solutions and systems created and applied inside companies without their authorization. How can you control the rise of Shadow IT in your business? You must first understand why it happens. Why do users feel the need to circumvent IT in the first place? In this article, we explore a few more reasons and share some tips to help you control Shadow IT.<\/em><\/span><br \/>\n<a name=\"201700821\"><\/a><!--more--><\/p>\n<figure id=\"attachment_7705\" aria-describedby=\"caption-attachment-7705\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-7705\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/03\/shadow-19354_640-300x199.jpg\" alt=\"\" width=\"300\" height=\"199\" srcset=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/03\/shadow-19354_640-300x199.jpg 300w, https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/03\/shadow-19354_640.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-7705\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/pixabay.com\/en\/shadow-lurk-lurker-alley-dark-19354\/\">PublicDomainPictures<\/a> via <a href=\"http:\/\/pixabay.com\/\">pixabay<\/a> <a href=\"http:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">cc<\/a><\/figcaption><\/figure>\n<p>How bad is Shadow IT? Probably worse than you think. According to one <a href=\"http:\/\/www.informationweek.com\/cloud\/shadow-it-its-much-worse-than-you-think\/a\/d-id\/1321637\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">report<\/span><\/a>, the use of Shadow IT is 15-20 times higher than CIOs predict.<\/p>\n<p>In other words, if you think your company doesn\u2019t have a Shadow IT problem&#8230;think again.<\/p>\n<p>The real question: How can you control it? If you want to control Shadow IT, you must first understand why it\u2019s happening. Why do end users feel the need to bypass IT in the first place? In the first part of this <a href=\"https:\/\/www.mrc-productivity.com\/blog\/2017\/08\/7-reasons-end-users-bypass-department\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">article<\/span><\/a>, we explored 7 common reasons:<\/p>\n<p>1. IT does not offer solutions quickly<br \/>\n2. IT and the business do not speak the same language<br \/>\n3. IT is viewed as a barrier<br \/>\n4. IT lacks the skills<br \/>\n5. Users aren\u2019t aware of the policies<br \/>\n6. Users think their issue is too minor<br \/>\n7. Users think they don\u2019t need help<\/p>\n<p>Today, let\u2019s take things a step further and explore a few more. Here are 5 more reasons why end users bypass your IT department.<\/p>\n<h3>1. IT is restricted by budget<\/h3>\n<p>Depending on what survey you read, it\u2019s estimated that anywhere from 50-80% of an IT budget is tied up in \u201ckeeping the lights on.\u201d When large percentages of the budget are tied up in keeping the lights on, innovation suffers and Shadow IT grows.<\/p>\n<p>How so?<\/p>\n<p>With so much of the budget already accounted for, IT is often caught between a rock and a hard place. Many simply don\u2019t have the budget to drive digital innovation. They\u2019d love to meet every business request, but lack resources.<\/p>\n<p>On the flip side, business departments aren\u2019t under the same budget constraints. So, what happens when an IT request gets denied due to budget restraints? It goes through the business department.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\u201cMany times, end users bypass the IT department to achieve faster delivery, or delivery of a more precisely targeted solution to their individual needs,\u201d explains <a href=\"https:\/\/www.linkedin.com\/in\/mikevnhall\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">Michael V.N. Hall<\/span><\/a>, a former technology executive with UnitedHealth Group, and now an independent technology consultant. \u201cIT department are subject to budget restrictions and governance practices, where many other business departments are not bound by the same restrictions.\u201d<\/p><\/blockquote>\n<p><strong>TIP<\/strong><br \/>\nIf raising the budget isn\u2019t an option, give users alternatives. Provide a list of secure options or self-service solutions that users can access. This gives users what they want, while maintaining control for the IT department.<\/p>\n<h3>2. Lack of sponsorship from upper management<\/h3>\n<figure id=\"attachment_8996\" aria-describedby=\"caption-attachment-8996\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-8996\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/03\/colleagues-437024_640-300x199.jpg\" alt=\"\" width=\"300\" height=\"199\" \/><figcaption id=\"caption-attachment-8996\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/pixabay.com\/en\/colleagues-seminar-presentation-437024\/\">nuggety247<\/a> via <a href=\"http:\/\/pixabay.com\/\">pixabay<\/a> <a href=\"http:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">cc<\/a><\/figcaption><\/figure>\n<p>Let me ask you a question: What is the attitude towards the IT department within your business? Is it positive or negative?<\/p>\n<p>Believe it or not, this plays a large role in whether or not users bypass IT. For instance, do you think an end user is more or less likely to practice Shadow IT if they view the IT department as a barrier?<\/p>\n<p>Now, where does this attitude come from? We\u2019ve found that it usually starts from the top. Of course, that\u2019s not to say there aren\u2019t disgruntled users. But, the overall attitude towards IT is largely driven by upper management.<\/p>\n<p>Is IT viewed by upper management as a critical part of the business, or a necessary evil? That attitude (whether good or bad) will spread throughout the whole business, whether you like it or not.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\u201cI believe that the underpinning problem really comes from the lack of alignment or even lack of understanding on how IT operates on a given business,\u201d says Rodrigo Montagner, CEO and Senior Partner at <span style=\"color: red; font-weight: bold;\">OM2 Tech Consulting Solutions<\/span>. \u201cIn other words, the core of the IT Services and general guidelines has to be fully understood by upper management. If this step is fully followed and aligned, and upper management sponsors this attitude, all the managers below the top executives would follow guidelines or simply act the same way on the medium or long run. I have seen both attitudes happening (sponsorship and non-sponsorship from upper management) and to me, this is really the core.\u201d<\/p><\/blockquote>\n<p><strong>TIP<\/strong><br \/>\nIn the last article, we explored the importance of educating the users. The same goes for upper management. Make sure management understands the business value of the IT department, and the importance of the processes you\u2019ve put in place.<\/p>\n<h3>3. Lack of presence<\/h3>\n<p>Where is your IT department located within your company? In some companies, IT is hidden away on their own floor. In other companies, the IT department is outsourced altogether.<\/p>\n<p>The result: IT lacks presence within the company. The IT Department is a mysterious entity that users only call when there\u2019s a problem.<\/p>\n<p>If the end users feel like the IT department is an unidentifiable entity, how do you think that impacts their decisions? Are they more or less likely to practice Shadow IT?<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\u201cIn regards to feelings of anonymity, I believe some users may feel as though their IT Department lacks a presence within the company other than to field problems,\u201d says Jake Tully, Head of Creative Department at <a href=\"https:\/\/www.truckdrivingjobs.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">Truckdrivingjobs.com<\/span><\/a>. \u201cIt may be more difficult to reach out to an entity that is somewhat unidentifiable and feel as though your concerns are being taken into consideration and that communication can be effective. With a cloud-based alternative, customer service is often paramount and can manifest itself in ways that solve the problem as well as pleasing the customer.\u201d<\/p><\/blockquote>\n<p><strong>TIP<\/strong><br \/>\nBring IT out of the Shadows. In some cases, this requires a physical relocation. In other cases, it means that you hold more cross-department functions. Involve IT in business meetings. Make the IT staff more visible to end users. Not only will their presence increase, but so will communication.<\/p>\n<h3>4. The alternatives are easier<\/h3>\n<p>Taking the last point one step further, many users are tired of being \u201cadded to the queue.\u201d They\u2019re tired of filling out complicated forms, and then waiting until IT gets around to their request.<\/p>\n<p>The problem: In many cases, getting up and running with a third-party cloud service is easier than the procedures that IT has in place. The form is simpler, and the results are immediate. As explained below, this is often the driving force behind Shadow IT.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\u201cIf a new cloud-based service could potentially solve the problem for $10\/mo and can be deployed by simply filling out a form\u2026it may be too easy for a user to pass up on,\u201d says Stephen Watts, Web Strategist at <a href=\"http:\/\/www.bmc.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">BMC Software<\/span><\/a>.<\/p><\/blockquote>\n<p><strong>TIP<\/strong><br \/>\nExamine your processes. Does IT force users to jump through hoops to request new solutions? Distribute a survey or even talk to the users to understand how they feel about the current processes.<\/p>\n<h3>5. They don\u2019t want IT to know what they\u2019re doing<\/h3>\n<p>Over the course of these two articles, we covered 11 reasons why end users bypass the IT department. If you address these issues, you\u2019ll see dramatic reductions in Shadow IT use. In a perfect world, fixing these issues should do the trick.<\/p>\n<p>Unfortunately, we don\u2019t live in a perfect world. You\u2019ll always have a few employees who break the rules on purpose. They\u2019re not trying to find a simple solution, get their work done, or be more efficient. They\u2019re trying to avoid detection.<\/p>\n<p>The good news: These employees are in the minority. Most practice Shadow IT for the reasons mentioned above. However, that doesn\u2019t mean you can ignore those who break the rules on purpose.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\u201cSome of these reasons have nothing to do with IT locking down the network, but rather employees trying to avoid being &#8220;caught&#8221; doing things on work time, such as streaming music, engaging in social media, or watching movies,\u201d says Dodi Glenn, Vice President of Cyber Security for <a href=\"https:\/\/www.pcmatic.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">PC Matic<\/span><\/a>. \u201cIT may have policies in place to prohibit using these networks. Violating these policies, in some cases, could lead to termination of the employee&#8217;s job. For this reason, employees try to hide what they are doing on company time.\u201d<\/p><\/blockquote>\n<p><strong>TIP<\/strong><br \/>\nSet up systems to monitor network traffic and cloud usage. This lets your IT department identify potentially unsafe activity.<\/p>\n<h3>Summary<\/h3>\n<p>In these two articles, we&#8217;ve covered 12 reasons why end users bypass the IT department. If you would like to add anything to this list, I\u2019d love to hear it. Feel free to share in the comments.<\/p>\n<div id=\"sendgrid_nlvx_widget-2\" class=\"widget widget_sendgrid_nlvx_widget\" style=\"padding-bottom: 10px;width: auto;text-align: center;background-color: #edeff4;border: 1px solid #d1d1d1\">\r\n\r\n<h3 class=\"widget-title\" style=\"font-size: 18px;margin-top: 28px;font-weight: 400;margin-bottom:25px\">If you enjoyed this article, sign up for email updates<\/h3>\r\n<p>Sign up below, and we'll notify you of new blog articles via email. We value your privacy and will never share or sell your information. To learn more about how we handle data, please review our <a href=\"https:\/\/www.mrc-productivity.com\/about\/privacy.html\">privacy policy<\/a>.\r\n\r\n\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Summary: \u201cShadow IT\u201d is a term used to describe IT solutions and systems created and applied inside companies without their authorization. How can you control the rise of Shadow IT in your business? You must first understand why it happens. Why do users feel the need to circumvent IT in the first place? In this &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.mrc-productivity.com\/blog\/2017\/09\/5-reasons-end-users-bypass-department\/\"> <span class=\"screen-reader-text\">5 (more) reasons why end users bypass the IT department<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","slim_seo":{"title":"5 (more) reasons why end users bypass the IT department - mrc&#039;s Cup of Joe Blog","description":"Summary: \u201cShadow IT\u201d is a term used to describe IT solutions and systems created and applied inside companies without their authorization. How can you control t"},"footnotes":""},"categories":[8],"tags":[77],"class_list":["post-11021","post","type-post","status-publish","format-standard","hentry","category-education","tag-shadow-it"],"_links":{"self":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/11021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/comments?post=11021"}],"version-history":[{"count":9,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/11021\/revisions"}],"predecessor-version":[{"id":15011,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/11021\/revisions\/15011"}],"wp:attachment":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/media?parent=11021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/categories?post=11021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/tags?post=11021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}