Three Major Shadow IT Security Risks in 2020

Table of Contents

Many businesses that hadn’t previously provided remote working tools for their employees have had to go for a quick fix as lockdown forced people to stay at home.

The problem is that adopting ad hoc solutions risk undoing years of careful procurement and security management. 

This leaves your business exposed to hackers and cybercriminals who are having a field day with hastily dispersed workforces. Gartner estimates that 33% of security attacks will be on Shadow IT resources this year. 

That’s not to say that Shadow IT is a new phenomenon or one that applies solely to remote workers. Shadow IT covers a wide range of ill-advised decisions, from executives buying a new smartphone to whole business units subscribing to a software-as-a-service solution unbeknownst to IT. The scale might be different, but the problem is the same.

In 2020 Shadow IT security risks are a mix of old and new. Here’s what to pay particular attention to.

Data Loss

One of the significant problems with Shadow IT is that it makes sensitive data vulnerable to leakage and theft and companies liable to fines for non-compliance with data regulations. 

83% of IT professionals reported that employees stored company data in unsanctioned cloud services, a challenge especially apparent with file sync and share tools.

Say Carlos in marketing populates Mailchimp with customer data for his email campaigns, and Anita in legal checks sensitive legal documents in Grammarly. Without thinking about it, they’re sharing a lot of essential data with external companies that IT doesn’t even know about. If either of these companies experiences a data breach, your IT department won’t say it affects them.

Once an IT team loses control over the software on its network and enterprise data is exposed by Shadow IT, they are no longer able to control who has access to that data.

While you cannot always control the sort of applications and services your employees use in the workplace, you can use data loss prevention (DLP) solutions to ensure the security of sensitive information. 

In recent years, DLP solutions have become more robust, taking advantage of new technologies such as machine learning, artificial intelligence and behavior analytics. A scalable DLP suite is a solid solution for small to medium businesses because it can grow with your company. 

Beyond DLP, you’ll also want to know what unauthorized apps are in use. A study from the Cloud Security Alliance found that 72% of IT leaders did not know the number of Shadow IT apps within their organization, but they want to.

The quickest way to gain visibility? Use a SaaS management platform like Augmentt. You automate by using our advanced log file analysis framework. We allow you to quickly identify every SaaS application being used on your network across the entire employee base.

Phishing Attacks

With remote work and Shadow IT, weak password practices can go unchecked, leading your organization vulnerable to phishing attacks. As people sign up for new accounts, they may use weak passwords or reuse old passwords. 

Credential surfing and password reuse are the most common ways attackers gain access to your confidential information. A survey from Entrust Datacard found that an astounding 42% of employees surveyed still physically write passwords down, 34% write them on their smartphones, and 27% write them on their computers.

Additionally, nearly 20% of employees are using the same password across multiple work systems, multiplying the risk of sensitive data if a password is compromised or stolen.

Although IT departments are aware of the security risks of Shadow IT to their organizations, most employees are not. Even the term Shadow IT makes most people think that it’s outside of their wheelhouse. With that in mind, it’s crucial to create a culture of security awareness that speaks to non-technical employees on what Shadow IT is and the risks associated.

Administrators and IT leaders need to help employees understand the risks of using unauthorized tools and how to implement best practices when it comes to trusting applications with company data.

Providing education like cybersecurity training programs can be an efficient way for employees better to understand their responsibility to the company’s overall security. 

Ransomware

Unsecured personal devices connected to enterprise networks are ransomware landing zones. According to IBM, Ransomware was deployed 3x more than any other type of malware in cloud environments, followed by cryptominers and botnet malware.

Ransomware is a form of malware that, once it takes over a computer or network, threatens to deny access to or destroy an organizations’ data. Ransomware can easily intercept an enterprise network after being accidentally downloaded by an employee on either a business or personal device connected to a network.

Some surveys unveil ransomware losses for businesses can average $2,500 for each incident. This involves companies willing to shell out upwards of $50,000 to decrypt their data.

Author
Gavin Garbutt
Co-Founder & Chairman of Augmentt

FAQ

Using our GDAP tool & Magic Link, setting up is easy! You can integrate with your CSP partner portal in minutes
Augmentt uses a combination of Microsoft Secure Score best practices as well as industry standards such as NIST & CIS. You can use the out of box templates to get started right away and even build your own custom templates to match your client requirements.
Out of box, Augmentt comes pre-configured to not be noisy. Very few Microsoft alerts are critical in nature so you will be receiving tickets for account breaches and not minor user log related events. That said, everything is customizable and you can turn alerts on & off to match your clients’ needs.
No. You can choose to schedule alerts to any stakeholder you want and at the frequency you want or manually download reports when you need them.
Regardless of how MFA is managed across your tenants, we have you covered. Augmentt supports Conditional Access Policies, Security Defaults, Entra ID per user (Legacy) MFA as well as 3rd party MFA services like DUO.
No. You can use Augmentt to monitor and manage all clients regardless of their licensing. For environments with no premium licensing you can still provide alerts and monitoring for account breaches and configure security best practices. For environments with premium licensing, you can leverage Microsoft’s premium alerts and premium security configurations such as Conditional Access Policies.
Augmentt is one of the few vendors SOC 2 Type II, and GDPR compliant.
Site licenses to make sure you can deliver standardized service across all clients very affordably.

SUBSCRIBE for more resources

Related Content

Policy Sprawl Is Killing MSP Efficiency
Policy sprawl is quietly draining your margins, creating security gaps, and eroding client trust. The good news? Standardization is the cure.
Does Microsoft Secure Score Tell the Whole Story?
Do you have a complete understanding of your security? See why MSPs need to understand the role licensing plays in Secure Score results.
Top 10 M365 Security Best Practices for MSPs
Here are the top M365 security best practices to help you enhance protection, ensure compliance, and stay ahead of emerging threats.