Data security in companies: 2 X 4 Tips against shadow IT

Work well, plant 500 trees! make the Working World more Human and Ecological, so we donate Revenue for Certified Afforestation. As Publisher Best of HR - Berufebilder .de® with a unique Book Concept, on Demand eCourses and News Service we share 15 years of Experience with our Customers (Samsung, Otto, State Institutions). By the Top 20-Blogger Simone Janson, referenced in ARD, ZEIT, WELT, Wikipedia .
Copyright: Artwork created by Simone Janson | Best of HR®

Employees are excellent problem solvers. Put an obstacle in their way and they will find a way around it. But that can be a long term problem for IT security Company .


Here writes for you:

Paul Chapman is CIO at Box.


Employees with own initiative are good, right?

If your employees show their own initiative and work with IT systems that do not work for them, then you can be sure that they will find a way out. And who can blame them? They have goals and deadlines to achieve. They have given customers and colleagues promises they need to keep.

And you may be thinking - where is the problem? If you have some workarounds at hand - wonderful. It's easier than thinking up new solutions. But workarounds can be a sign that yours Company can not keep up anymore.

The path of least resistance

Let's look at the most common solutions that people use to do their jobs. Always popular is sending documents via eMail Personal accounts that allow them to work outside the office - that certainly benefits productivity.

Tip: Text as PDF (please read the instructions!) or to this text complete eCourse Download. Actions or news via Newsletter!

Then there are the popular collaboration solutions - setting up unauthorized synchronization and sharing services so they can access many different files in a Starbucks or the airport lounge and share them with colleagues, suppliers, and partners.

This means that sensitive corporate data is shared on the Internet in places your IT department can not see. And that's the problem with the path of least resistance - over time, it creates IT security issues in your business.

Why are ECM systems not suitable for employees?

Actually, there is a solution to this problem. It's called Enterprise Content Management (ECM) and came up in the 2000 years. These ECM systems were well-suited for managing mission-critical information and processes, but they did not provide a pleasant user experience. That was a disappointment.

Systemscope research shows that over 50 percent of ECM projects had lower takeover rates than expected. And even worse, 50 percent have failed completely. So it's no wonder that workarounds have become a solution. So what's the problem? Why are ECM systems not suitable for employees?

A step behind reality

Many ECM systems were developed before this rapid development began. Now their abilities lie behind the modern business reality, which is why employees are forced to find workarounds for doing your job.

Tip: Text as PDF (please read the instructions!) or to this text complete eCourse Download. Actions or news via Newsletter!

Every conceivable way we manage our business has changed in the past ten years. In particular, four forces have shaped our way of working today.

  1. Mobility: Today, almost all the world can be reached by smartphone, so businesses need to meet special customer expectations and provide mobile services that improve the quality of life and convenience of their customers.
  2. analysis: Organizations need to manage unbelievable amounts of data and identify the critical information they need to improve their customer experience, or the data needed to run applications and devices.
  3. Cloud: Today's businesses are built on cloud technology, while established technology giants are increasingly collaborating with native cloud providers.
  4. The Internet of Things: Up to 2020, new business models need to integrate 25 billion networked devices that generate information, in addition to the existing network of mobile users.

The extent of shadow IT

According to, only 8 percent of companies are aware of the level of shadow IT that hides in their processes. This means that for most organizations, the data hidden in the systems, such as network protocols, eMailTraffic, annexes, corporate credit card reports, telephone bills, ISP bills and firewall protocols are unaware.

By working directly with the employees in your company right from the start, you can find out what is wrong in your systems and processes before it is too late.

What the IT approves is alright?

Bypassing ECM systems does not happen completely unrecognized. Many IT managers are being pressured by the business to enable collaboration and mobility and are forced to use the company's approved workarounds.

Adding external partners to the corporate directory is an example. Duplication of data from the internal network in the DMZ is also common, but absolutely not ideal. The increased storage and management costs of duplication are a problem. Frequently, sensitive data in the DMZ land, making it a main target for hackers. Companies know the risks, but they often do not know that there is a secure alternative.

Tip: Text as PDF (please read the instructions!) or to this text complete eCourse Download. Actions or news via Newsletter!

Collaboration that works

To be a step ahead of this problem, a next-generation enterprise content management and collaboration platform must meet four key criteria:

  1. Versatile content management: The system must be able to manage ALL content types on thousands of apps on all devices and up to the cloud.
  2. Flexible security control: You can be sure that content and data are secure but still accessible by users.
  3. Workflow integration: Optimal interoperability to enable content and communications to be routed securely and seamlessly through critical business solutions and LOB apps.
  4. User Experience: And, of course, it must offer a fantastic user experience. If the IT solution does not provide optimal user experience, it is not accepted.

More knowledge - PDF download, eCourse on demand or personal advice

Offline download: Download this text as PDF - Read usage rights, Because we do not automatically submit the title of this text for privacy reasons: When buying in "interests" the title register if support is needed. After buying text exclusively Download at this URL (please save).

3,99 Book now

Your eCourse on Demand: Choose your personal eCourse on this or another desired topic, As a PDF download. Up to 30 lessons with each 4 learning task + final lesson. Please enter the title under "interests". Alternatively, we are happy to put together your course for you or offer you a personal regular eMailCourse including supervision and certificate - all further information!

19,99 Book now

Consultant packages: You want to increase your reach or address applicants as an employer? For these and other topics we offer special Consultant packages (overview) - For example, a personal phone call (price is per hour).

179,99 Book now

You want to comment here? Please the Debate Rules comply, contributions must be unlocked. Your eMailAddress remains secret. More information on the use of your data and how you can counter this can be found in our Privacy Policy.

  1. To follow debate on this post
  2. All debates follow
  1. Competencepartner

    Data Security in Business: 2 X 4 Tips against Shadow IT by Paul Chapman - Highly recommended 1xNdvBOXig

  2. Thomas Eggert

    Data security in companies: 2 X 4 Tips against shadow IT by Paul Chapman via BERUFEBILDER - Highly recommended MR8DmQ16K6


    Data security in companies: 2 X 4 Tips against shadow IT by Paul Chapman via BERUFEBILDER - Highly recommended z0cc1mPz0C

Post a Comment

Your email address will not be published. Required fields are marked with * .

JaI would like to be regularly informed about the latest promotions & offers Newsletter be informed.

I hereby accept the Debate Rules and the Privacy policy with the possibility to contradict the use of my data at any time.