With digital innovation becoming the main driver for growth, the way your IT department operates is critical. In order to stay relevant in an ever more digital future, you need to take a look at Shadow IT within your company. You’d be surprised about what you can learn.
If you see your employees using tools that aren’t approved by the IT departement, chances are something is wrong with your IT policy. Use of unapproved tools and apps is called ‘Shadow IT’. Almost every modern organization today is confronted with some form of shadow IT: employees might be using their own Google Drive or Dropbox to make files available off-site, or maybe they’re using a private license of Microsoft Word Online to write copy.
In and of itself, shadow IT isn’t bad. You could look at the phenomenon as feedback from within your organization, telling you there is a problem with the way you’re implementing business technology right now. Employees are always looking for the most efficient way to perform their tasks. If they feel the need to use their own apps, that means you’re not providing them with the right tools.
There are of course some legal side effects of allowing shadow IT to fester. Imagine a well-meaning employee backing up a spreadsheet containing identifiable personal data to his Dropbox. Despite your best efforts, your company is now all of a sudden no longer in compliance with GDPR legislation. You’ll potentially also lose security control of the data, and there might even be some licensing issues.
Shadow IT therefore needs to be addressed. There are three ways of doing this. The first is restrictive: your employees have chosen the path of least resistance to do their jobs in the most efficient way possible. You can close that path, and make the use of company software mandatory. Your employees will lose tools they have come to rely on. This is obviously a very bad idea.
Addressing the issue
You’re far better of handling shadow IT at its source. The very existence of the issue is a sign of the times. Today, employees expect technology at their workplace to be at least on par with the tech they use at home. In practice, they decide what tools are best.
As a company, you may attempt to react to and learn from the software employees are using. This, in fact, means you’re playing catch up. If you’re only starting to consider a cloud platform for file sharing when everyone in the organization is already using OneDrive or Dropbox, you’re losing valuable time.
A proactive approach entails a completely new way of looking at the role of IT, the culture in your company and the required mindset of the CIO. IT is no longer a top down business; all technology decisions need to be made with the users in mind. I realize that’s easier said than done.
Three core principles might help you to make the transformation.
- Listen to the human voice
A modern IT policy starts with the employee. You need to know the employee journey, from the moment they wake up in the morning until they turn in for the night. What do they need, why, and how can you address those needs? Do they want to work on the go?
- Data and integrity
Integrity is the next logical evolution of security. As soon as you’ve given your employees the tools they need to perform, you should think about protecting the integrity of your organization. A big wall around the IT infrastructure just won’t cut it anymore. Today, data needs to be at the center of your security solution. By managing who can use data, when, where and how, you’re able to offer a far wider range of applications to the employees.
- Asking questions and failing forward
Any CIO thinking that they have all the answers, is destined for failure. Talking and listening to your employees is not a weakness, but a strength. Ask them about the tools they think they need, and incorporate those in your IT policy. They are the ones that will be using new applications, so why wouldn’t you ask them what they want and when they need it? Don’t be afraid to set up a cloud-powered pilot project to try out something new. Worst case scenario: it doesn’t work out and you need to try something else.
The power of cloud
To combat shadow IT, the most important tool in your arsenal is the cloud. The cloud is not a place. It is a methodology to deliver business technology. Use it to roll out platform-agnostic applications. These applications offer the same user experience on Windows, Mac, Linux, iOS and Android. This empowers your employee and allows them to use the hardware and OS they like most. By making the right apps available, you’ll allow everyone to use the workflow they know to be the most efficient, while still maintaining control. The key here is to ensure the same application functionality on any platform. That requires a workspace strategy, not a desktop one.
The amount of control workspace working offers, goes far beyond anything you might use today. Imagine a bank with a BYOD policy. Employees could use a platform-agnostic app to access sensitive data on their device while at work. As soon as they leave for home, the data is automatically deleted or access is limited or revoked. By leveraging the cloud and implementing security on a software level, you’re able to give employees a mission-critical app on their favorite device, which allows them to be more productive. They won’t resort to using unsafe third party apps, because as you listened to their needs and you’ve enabled them with a safe and powerful alternative.
By innovating alongside your employees, listening to their needs, and going the extra IT mile, you’ll not only make them happier and more efficient. At the same time, you’re preparing your organization for a bright digital f