Data security in companies: 2 X 4 Tips against shadow IT

Work better, information as desired! We give you the information you really need and are committed to a better and more ecological working environment. When Book Publisher Best of HR –® with Unique Book Concept and eCourses we offer over 20 years of experience in Corporate Publishing - with Clients like Samsung, Otto, Governmental Institutions. Publisher Simone Janson also heads the Institute Berufebilder Yourweb, which awards scholarships, for example, and belongs one of the top 10 female German bloggers, referenced in ARD, FAZ, ZEIT, WELT, Wikipedia .
Copyright:  Images created by Simone Janson | Best of HR -®

Employees are excellent problem solvers. Put an obstacle in their way and they will find a way around it. But that can be a long term problem for IT security Company .


Here writes for you:


Paul Chapman is CIO at Box.


Employees with own initiative are good, right?

If your employees show their own initiative and work with IT systems that do not work for them, then you can be sure that they will find a way out. And who can blame them? They have goals and deadlines to achieve. They have given customers and colleagues promises they need to keep.

And now you might be thinking - what's the problem? If you have some workarounds at hand - wonderful. It's easier than coming up with new solutions. However, workarounds can be a sign that your Company can not keep up anymore.

The path of least resistance

Let's look at the most common solutions that people use to do their jobs. Always popular is sending documents via eMail personal accounts so they can work away from the office - productivity certainly benefits from this.

Tip: Text as PDF (please read the instructions!) or to this text complete eCourse Download. Actions or news via Newsletter!

Then there are the popular collaboration solutions - setting up unapproved synchronization and sharing services so that they can access a wide variety of files in a Starbucks or the airport lounge and share them with colleagues, suppliers and partners.

This means that sensitive company data is distributed on the Internet in places that your IT department cannot see. And that is the problem with the path of least resistance - over time it leads to problems for IT security in your company.

Why are ECM systems not suitable for employees?

Actually, there is a solution to this problem. It's called Enterprise Content Management (ECM) and came up in the 2000 years. These ECM systems were well-suited for managing mission-critical information and processes, but they did not provide a pleasant user experience. That was a disappointment.

Research from Systemscope shows that over 50 percent of ECM projects had lower takeover rates than expected. And what's worse, 50 percent failed completely. So it's no wonder that workarounds have become a solution. So what's the problem? Why are ECM systems not suitable for employees?

A step behind reality

Many ECM systems were developed before this rapid development began. Now their abilities lie behind the modern business reality, which is why employees are forced to find workarounds for doing your job.

Tip: Text as PDF (please read the instructions!) or to this text complete eCourse Download. Actions or news via Newsletter!

Every conceivable way we manage our business has changed in the past ten years. In particular, four forces have shaped our way of working today.

  1. Mobility: Today, almost all the world can be reached by smartphone, so businesses need to meet special customer expectations and provide mobile services that improve the quality of life and convenience of their customers.
  2. analysis: Organizations need to manage unbelievable amounts of data and identify the critical information they need to improve their customer experience, or the data needed to run applications and devices.
  3. Cloud: Today's businesses are built on cloud technology, while established technology giants are increasingly collaborating with native cloud providers.
  4. The Internet of Things: Up to 2020, new business models need to integrate 25 billion networked devices that generate information, in addition to the existing network of mobile users.

The extent of shadow IT

According to, only 8 percent of companies know the extent of shadow IT that is hidden in their processes. This means that for most companies, the data hidden in the systems such as network protocols, eMailTraffic, annexes, corporate credit card reports, telephone bills, ISP bills and firewall protocols are unaware.

By working directly with the employees in your company right from the start, you can find out what is wrong in your systems and processes before it is too late.

What the IT approves is alright?

Bypassing ECM systems does not happen completely unrecognized. Many IT managers are being pressured by the business to enable collaboration and mobility and are forced to use the company's approved workarounds.

Adding external partners to the corporate directory is an example. Duplication of data from the internal network in the DMZ is also common, but absolutely not ideal. The increased storage and management costs of duplication are a problem. Frequently, sensitive data in the DMZ land, making it a main target for hackers. Companies know the risks, but they often do not know that there is a secure alternative.

Tip: Text as PDF (please read the instructions!) or to this text complete eCourse Download. Actions or news via Newsletter!

Collaboration that works

To be a step ahead of this problem, a next-generation enterprise content management and collaboration platform must meet four key criteria:

  1. Versatile content management: The system must be able to manage ALL content types on thousands of apps on all devices and up to the cloud.
  2. Flexible security control: You can be sure that content and data are secure but still accessible by users.
  3. Workflow integration: Optimal interoperability to enable content and communications to be routed securely and seamlessly through critical business solutions and LOB apps.
  4. User Experience: And, of course, it must offer a fantastic user experience. If the IT solution does not provide optimal user experience, it is not accepted.

More knowledge - PDF download, eCourse on demand or personal advice

Offline download: Download this text as PDF -  Read usage rights, Because we do not automatically submit the title of this text for privacy reasons: When buying in "interests" the title register if support is needed. After buying text exclusively Download at this URL (please save). Or for a little more directly an entire book or eCourse with this text buy, read on.

3,99 Book now

Your eCourse on Demand: Choose your personal eCourse on this or another desired topic, As a PDF download. Up to 30 lessons with each 4 learning task + final lesson. Please enter the title under "interests". Alternatively, we are happy to put together your course for you or offer you a personal regular eMailCourse including supervision and certificate - all further information!

19,99 Book now

Consultant packages: You want to increase your reach or address applicants as an employer? For these and other topics we offer special Consultant packages (overview) - For example, a personal phone call (price is per hour).

179,99 Book now

You want to comment here? Please the Debate Rules comply, contributions must be unlocked. Your eMailAddress remains secret. More information on the use of your data and how you can counter this can be found in our Privacy Policy.

  1. To follow debate on this post
  2. All debates follow
  1. Competencepartner

    Data Security in Business: 2 X 4 Tips against Shadow IT by Paul Chapman - Highly recommended 1xNdvBOXig

  2. Thomas Eggert

    Data security in companies: 2 X 4 Tips against shadow IT by Paul Chapman via BERUFEBILDER - Highly recommended MR8DmQ16K6


    Data security in companies: 2 X 4 Tips against shadow IT by Paul Chapman via BERUFEBILDER - Highly recommended z0cc1mPz0C

Post a Comment

Your email address will not be published. Required fields are marked with * .

Ja, I would like to be informed about the latest promotions and offers via Newsletter be informed.

I hereby accept the Debate Rules and the Privacy policy with the possibility to contradict the use of my data at any time.