https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • Diversity & Inclusion
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • COVID-19 Partner Help
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • EMEA
  • Awards
    • Back
    • Excellence in Digital Services
    • 2020 MSP 501
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
  • Channel Mentor
    • Back
    • Channel Market Intelligence
    • Channel Educational Series
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • Diversity & Inclusion
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • COVID-19 Partner Help
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • EMEA
  • Awards
    • Back
    • Excellence in Digital Services
    • 2020 MSP 501
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
  • Channel Mentor
    • Back
    • Channel Market Intelligence
    • Channel Educational Series
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Digital Service Providers
  • Cloud Service Providers
  • CHANNEL PARTNERS ONLINE
 Channel Futures

From the Industry


The Smart MSP’s Response To Shadow IT Threats

  • Written by Intronis Guest Blog 2
  • February 27, 2014
As BYOD, the cloud, and the consumerization of IT gain traction in your customers’ businesses, a potential security threat known as shadow IT comes with it.

You don’t have to search very hard to find an IT trend article touting the massive adoption of consumer-grade mobile devices (primarily tablets and smartphones) and cloud services being used in enterprises of all sizes and across all verticals. 

Research firm MarketsandMarkets estimates the BYOD and Enterprise Mobility market is growing at a 15 percent CAGR and will reach $181 billion by 2017. A study from Skyhigh Networks, which monitors the use of cloud services for businesses, found that the average enterprise uses 545 cloud services, which is approximately 500 more than the average CIO is aware of. What these trends point to is the stark reality that employees aren’t waiting for IT’s permission to download apps and deploy a myriad of cloud-based collaboration services they feel help them do their jobs better.

Not only are these rogue content sharing and social media services consuming enterprise bandwidth (YouTube, Pandora, and Facebook are among the top 10 highest volume services), but there’s also a very real security risk.  What’s more is that the same study reveals that IT blocking initiatives, which are more often deployed to block services based on productivity loss as opposed to risk, were found to block only 8 percent of high risk services.

As your clients’ trusted business advisor, it’s important to first recognize the reality of this threat and secondly to understand that your clients may be completely oblivious about this matter. Engage your clients and educate them about them about the risks shadow IT poses to their companies. And, once they agree this threat is real, help them implement best practices. Here are a few to start:

Adopt a Shadow IT Policy

One of the biggest reasons shadow IT flourishes within organizations is because there’s no definitive standard governing the devices and apps employees can and can’t use. Even though an IT person may talk to individuals on a case-by-case basis, many operate by the philosophy that silence is approval (also translated: “It’s easier to beg for forgiveness later than it is to ask for permission upfront.”). You can help clients reduce this threat by developing IT policies that define acceptable use policies around company-issued and employee-owned computing devices used on the company’s IT network (both wired and wireless).

Security software vendor Symantec saw this as important enough of an issue that it consulted members of more than 65 groups to get a better understanding about how to create an effective BYOD policy, which fits in perfectly with developing a shadow IT policy. According to its research, a good place to begin developing a shadow IT policy is by having a client consider how certain consumer devices, apps, and cloud-based services line up with its business goals. Reasons for allowing consumerized IT into the workplace could include: “to increase employee satisfaction,” “to reduce capital expenditures for hardware,” or “to reduce IT support costs.”

It is important to note, however, that agreeing to allow some consumer devices, apps, and services into the organization, doesn’t mean it has to be a free-for-all. And, that’s where MSPs and IT service providers can help clients draw the line with regard to which devices, apps, and services to permit and which ones to declare off limits at work. Kraft Foods is a good example of a company that’s finding this balance.

According to Kraft CIO Mark Dajani, Kraft virtualized its applications environment so mobile workers could more easily use their Android devices at work. However, Kraft employees must keep their software up to date otherwise they’re locked out of Kraft’s network. Helping your clients create similar policies sends the message to employees that the consumerization of IT is not a one-way street and everyone needs to work together to make it work.

Drive Employee Satisfaction Without Compromising Business Security

Security tools exist that enable MSPs to help clients identify exactly which devices, apps, and other network-related services are being used on the corporate network. Offering this as a service can be a great way to help customers get a handle on their shadow IT issues. It’s important to pay particular attention to high-risk applications, which according to the Skyhigh report includes file-sharing services such as CloudApp, RapidGator, Zappyshare and Uploaded as well as bandwidth-hogging services such as YouTube, Pinterest, Vimeo and Photobucket.

If there’s one thing about customers’ networks — especially in today’s BYOD environments — it’s that they’re constantly changing. It’s not feasible to manually monitor a client’s network and to expect to catch every shadow IT policy violation that may occur. This is where a network security solution that includes network access controls, bandwidth and application monitoring, and automated alerts can be a huge asset to help an MSP looking to protect its clients from an array of vulnerabilities created by BYOD and other shadow IT activities.

Don’t Neglect BCDR’s Role in Your Shadow IT Strategy

Some MSPs and end users may think only of IT security solutions when it comes to addressing Shadow IT, but having a reliable BCDR (business continuity and disaster recovery) strategy is an essential component as well. That fact is that as much as businesses attempt to lock down their networks and enforce best practices among employees, problems will occur — whether from accidents or outright defiance. When network security breaches occur, it’s not uncommon for mission-critical files, folders and apps to become corrupted or deleted during the clean-up process. This is where having a secure, cloud-based backup can be a lifesaver, allowing the MSP to quickly locate the most recent working version of the missing or corrupted data/file and to perform a data restore.

No matter what IT challenge your customers face – whether hurricane, flood, accidentally deleted file or a shadow IT-related “situation” – it’s nice to know that their trusted business advisor has them covered. And, only with a reliable BCDR solution can an MSP make that claim with confidence.

Neal Bradbury is co-founder and VP of Channel Development at Intronis.

Tags: Cloud Service Providers Digital Service Providers MSPs VARs/SIs From the Industry

Related


  • Ransomware and malware
    Help Your Customers Mitigate Malware: Viruses, Worms, and Trojans…Oh My!
    With the right antivirus protection, your customers can better detect and prevent the spread of malware.
  • SMB cybersecurity
    SMBs’ Cybersecurity Risk Awareness Is Rising
    The majority of SMBs would switch MSPs for the right cybersecurity support.
  • cloud data
    Your Cloud Data Is Protected, But Is It Portable?
    Why flexibility and containerization are the new must-haves for cloud data.
  • office 365
    How to Improve First Call Resolution with Microsoft Office 365 Service Tickets
    Here are some tools and strategies for improving the rate of FCR with Office 365 service tickets.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • 2021 Trends: Set the Stage for a Successful 2021
  • Top 4 Benefits of an RMM System
  • Rethink Endpoint Protection in 2021
  • 2020: The Year of the Triple

Galleries

View all

New, Changing Partner Programs: AWS, Tech Data, Avaya, Verizon

January 11, 2021

Industry Perspectives

View all

The Right Data Migration Tool Helps Schools Move to Cloud During COVID Crisis

January 19, 2021

Cloud-Based CRM: What SMBs Need to Know about Backup and Recovery

January 19, 2021

Cybersecurity: What to Expect in 2021

January 19, 2021

Webinars

View all

Blueprint for a Scalable MSSP Practice in 2021

January 21, 2021

Who’s Behind the Mask? Hacker Personas Explained

January 26, 2021

Your Network Perimeter Has Changed

February 18, 2021

White Papers

View all

Why Subscription Business Model

January 15, 2021

The Ultimate MSP Guide to Sales Efficiency

January 14, 2021

Eight Reasons Why MSPs Need IT Industry-Specific Sales Tools

January 14, 2021

Upcoming Events

View all

Channel Partners Virtual

March 2, 2021 - March 4, 2021

Channel Partners Conference & Expo

November 1, 2021 - November 4, 2021

Videos and Fastchats

View all

FASTCHAT: How SOAR Eliminates Security Challenges and Elevates Service Provider Revenues

January 6, 2021

Happy Holidays from Channel Partners & Channel Futures!

December 21, 2020

FASTCHAT: How Old, Unpatched Technologies Are Creating New Security Threats for MSPs and Their Customers

December 3, 2020

Twitter

ChannelFutures

Our latest #Cybersecurity Roundup features @BitSight and @kovrrIns, @Vectra_AI and @AppOmniSecurity,… twitter.com/i/web/status/1…

January 20, 2021
ChannelFutures

.@solarwinds hackers target @Malwarebytes, impacting internal emails. #cybersecurity dlvr.it/RqzkZp https://t.co/aWqLjCCW9y

January 20, 2021
ChannelFutures

.@citrix $2.25 deal to acquire @wrike expands @CitrixPartners network into collaborative work management.… twitter.com/i/web/status/1…

January 20, 2021
ChannelFutures

.@Carbonite Migrate uses real-time replication to move workloads to #cloud with minimal risk and near-zero downtime… twitter.com/i/web/status/1…

January 20, 2021
ChannelFutures

Backup and recovery is essential for #cloud-based CRMs @ConnectWise #SaaS #dataprotection #cloudbackup #databackup… twitter.com/i/web/status/1…

January 19, 2021
ChannelFutures

You an #MSSP looking to avoid a #SolarWinds-type breach? @Asigra, @Barracuda, @CynetSystems give advice. Don’t blam… twitter.com/i/web/status/1…

January 19, 2021
ChannelFutures

What to expect in 2021 @Webroot #cybersecurity #MSP #remoteworkforce #remoteworking #Carbonite… twitter.com/i/web/status/1…

January 19, 2021
ChannelFutures

From #itautomation to #workfromhome, a look at 2021 trends from @BitTitan. dlvr.it/RqwFZg https://t.co/EkCeJVNAPo

January 19, 2021

MSSP Insider

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Channel Partners Online

Want more? Find more channel news and analysis on our sister site, Channel Partners.

Media Kit And Advertising

Want to reach our audience? Access our media kit

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Online
  • Channel Partners Events
  • MSP 501
  • MSSP Insider
  • IoT World Today
  • Webhostingtalk

WORKING WITH US

  • Contact
  • About us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X