Cyber Security Today, August 4, 2023 – The shadow hanging over IT networks

The shadow hanging over corporate IT networks

Welcome to Cyber Security Today. It’s Friday, August 4th, 2023. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S.

Cyb er Security Today on Amazon Alexa Cyber Security Today on Google Podcasts Subscribe to Cyber Security Today on Apple Podcasts

 

I’m off for a few days, so today’s podcast isn’t about the latest cybersecurity news. Instead I want to talk about a shadow that could be hanging over your IT operations. It’s called shadow IT. As a report issued last week by the U.K. National Cyber Security Centre explains, shadow IT is not the same as Bring Your Own Device. When an organization adopts a BYOD policy employees have to allow some sort of corporate control so their laptops, tablets or smartphones can connect to their organization’s IT network — for example, putting an agent on the device to make sure it’s always got the latest patches.

Shadow IT describes employee devices connecting to the network that the IT department knows nothing about.

Despite being forbidden, employees come up with all sorts of reasons to use unapproved devices: The company-owned device doesn’t have enough storage, it blocks them from sharing data with a third party, company-approved software isn’t as fast or as comprehensive as cloud apps … the list goes on.

Actually, the report notes, IT leaders can learn something from employee use of unapproved devices: The approved computers and applications may be not be good enough to let them do their jobs efficiently.

However, employees have to be reminded that shadow IT poses a big risk of data theft to the organization, and therefore its survival.

What to do? The report has a list of useful recommendations. One is, listen to your employees’ complaints.

That’s it for now. But later today the Week in Review will be available. It’s a replay of my interview with the co-author of the Blueprint for Ransomware Defence.

Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada
Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

Sponsored By:

Cyber Security Today Podcast