Shadow IT is not an unknown phenomenon. The truth is it happens in many Danish workplaces. In fact, Version2 in 2017 estimated that 9 out of 10 cloud services are operated outside of the IT department. Therefore, there’s no need to feel alone in the world when it comes to problems with Shadow IT. However, you need to know what Shadow IT is and what to do when coming across it.

Just a minute. Shadow huh?

Shadow IT is a sort of stealthy IT that isn’t controlled by the company’s IT department. It doesn’t necessarily mean the IT department is slow or inept – perhaps it’s just big or completely kept out of the loop by users who start using IT solutions that your company hasn’t authorised. There are a number of examples of Shadow IT:

Perhaps the company decided to use Salesforce. A sales rep then suddenly starts using another solution in order to keep some of his clients to himself.

Or perhaps the IT department has issued a policy about using OneDrive – in which case you don’t want people to use Google Drive or Dropbox instead.

Another example is that all communications should happen through Skype and yet the employees chat internally on Slack. In other words, we’re talking about desktop applications or apps the IT department isn’t responsible for operating.

How do I find out if my employees are using Shadow IT?

Firstly, you should ask your employees which applications they use. Grant them a ‘safe passage’ and discuss the ’illegal’ software. This is a great way to have a talk about Shadow IT and how your company should handle it.

One of the software solutions developed by CapaSystems is PerformanceGuard, whose primary purpose is to collect and analyse performance data from your IT system. As an added bonus, you as an IT manager can also receive a notification e-mail whenever one of your computers accesses applications and online apps they’re not supposed to use.

Data is likely collected from all of the company’s computer systems to a greater or lesser extent. Therefore, your IT department can also see which applications and apps the machines are accessing. The data analysis is a great help in tracking down Shadow IT, and the insights can be used as a catalyst to rethink whether you have the right IT solutions.

How should I penalise Shadow IT?

Maybe you should not actually penalise it. It is vital that the IT department should learn from Shadow IT instead of just penalising the people using it.

‘You shouldn’t necessarily combat the use of Shadow IT in your business. Instead, you should approach it with an open heart,’ advises Steen Teudt, Product Manager of PerformanceGuard at CapaSystems. He explains:

‘At the end of the day, Shadow IT exists because there is a need. Nobody uses Shadow IT to become less efficient. Consider it a wake-up call for the IT department; otherwise people will enable a VPN and do it that way.’

Ultimately, it’s about the employees not feeling they are being listened to. That’s why they use Shadow IT. Going back to the communications example, the root cause may be that Slack can be used both internally in a group and to contact people outside the company. Perhaps you should switch from Skype and move all communications to Slack in the future.

Often cloud solutions provide the most challenges. People use Google Drive instead of OneDrive or a third solution. Therefore, listen to your staff to find out why Google Drive is being used instead of OneDrive.

Although the word Shadow IT may sound scary, it is important to see it differently: Your employees want to do their work efficiently, but your existing systems don’t allow for that. By knowing how your employees use Shadow IT, you gain insight into how they work. You can use this knowledge to develop your approved IT systems in the future.

Download the free Whitepaper

 

"From operations to strategy"

 

You’re very likely facing this every day—a requirement for increased automation throughout the organization in order to raise competitiveness and also increase user satisfaction. That’s a difficult balancing act, and only few people succeed.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download the free Whitepaper regarding Digital Employee Analytics

 

"Employees are (also) the real success factor in the digital era"

 

In today’s digital world, employees build their careers on the ever-changing opportunities presented to them. So, competitiveness requires more from companies than ever before — you need to present your corporation as attractive as possible to existing as well as future employees.

Therefore, you need to incorporate the Employee Experience, which includes all aspects of the relation between the employee and the employer.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download the free Whitepaper

 

"How to select the right software provider"

 

Software providers abound, and very likely they will call you again and again wanting to present their solutions.

CapaSystems has made a brief guide with concrete advice on what you need to be aware of when you contemplate switching software providers or wish to integrate a new system in your organization.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download a free Whitepaper regarding the CIOs role in the future

 

"CIO as business developer"

 

It is crucial that businesses’ CIOs are able to identify, select and evaluate the IT services that provide maximum insight and increase growth and productivity. That requires tools that provide up-to-date operational insight into services’ functionality and stability.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

User Experience

Download free whitepaper regarding performance issues and end user simulation

 

"Solve your performance issues with end user simulation"

 

A recent study showed that Danish employees waste an average of 144 hours a year on slow computers. To a company of 500 employees, that is hundreds of thousands of Danish kroner. This whitepaper describes how you can minimise waiting time by having your IT provider comply with your service agreements.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download free Whitepaper from CapaSystems regarding performance issues and how to awoid wasting time

 

"Analyze infrastructure and use time efficiently"

 

Performance problems and long login times can easily cost businesses and organizations time that corresponds to several full-time jobs every year. It can be hard to identify the roots of the problems with traditional solutions.

End-user performance monitoring, however, provides an overview that covers the entire infra-structure – from end users to network and server applications. That provides an accurate, factual basis for correcting current problems and for nipping future problems in the bud.

 

Download the free Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download free whitepaper regarding BYOD

 

"Bring Your Own Device?"

 

Mix of personal and business applications on same IT devices makes IT departments worry.

But what about the security of your company in this universe of personal and business apps provided by a Bring Your Own Device (BYOD) culture?

 

 

 

Download the white paper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download free whitepaper regardingShadow IT

 

"Cast new light on Shadow-IT"

 

It’s a challenge when employees and business units purchase technology and IT services without involving the IT department. You easily lose perspective of finances, agreements and where important information is located –and if you’re not able to name who’s responsible for support from day one, a service outage risks being interpreted as internal trouble, even though the IT department has nothing to do with it.

 

 

Download the Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.

Download free whitepaper regarding security

 

"3 steps to secure the company against data sheft"

 

It is said that a chain is only as strong as its weakest link. Therefore, your weakest link in the IT systems will have to be properly secured. Here are our suggestions for three things that can secure your IT infrastructure.

 

 

Download the Whitepaper from CapaSystems and read more...

Thank you for signing up. You will receive a link to our free Whitepaper in your inbox.