What are the Cybersecurity challenges for Shadow IT?
Shadow IT is being qualified as IT systems / solutions / services adopted by certain business units within an organization without explicit IT department endorsement / approval. Such challenges include:
the IT systems / solutions / services might not follow / comply to enterprise wide IT security, governance, audit or even regulatory requirements e.g. some companies not allow IT systems to "Call Home" to the Shadow IT service provider for proactive support / analytics etc.
There is a risk that Shadow IT not including security measures as part of their initial solution design or implementations e.g. pilot study, production deployment etc. rendering the solution being vulnerable for cyber attack, ransomware attack etc.
There is a risk that Shadow IT including "backdoor" into their solutions knowing the end users / business users are not IT savvy.