LANDESK

The Reality of Shadow IT

Don’t be left in the dark. Explore the facts that help determine risks to your business and the actions you should take to bring IT out of the shadows.

93% of IT professionals surveyed reported that when employees use their own smartphones, tablets, or other devices to work with business information, it causes issues. 1
Adware is the number one mobile threat that is responsible for 28.8% mobile attacks. Followed by Trojan SMS that is responsible for 22%. 2
53% of respondents report there is sensitive customer information on their mobile devices. 1
93% of respondents admit that they had mobile devices connecting to corporate networks. 3
Only 19% of almost 800 respondents say their organizations actually know how much regulated data is on these devices and 16% say they know how much resides in cloud-based file sharing applications such as Dropbox, Box and others. 4
Of companies with over 5,000 employees, more than half (52%) reported that the cost of mobile security incidents last year exceeded $500,000. 3
24% of all corporate users use SaaS applications because non-approved software provides better solutions than the IT-approved equivalent. 5
Just under half of the 4,000-plus respondents to the Ponemon survey said they already transfer sensitive or confidential data to external cloud services. 1
50% of IT managers admit that half of their budget is wasted on managing Shadow IT. 6
An average of 63% of employees use mobile devices such as laptops, tablets, and smartphones to access and use data in the workplace. 4
80% of both IT workers and business workers admit to using SaaS apps at work without IT's approval. 7
49% of respondents stated that they have corporate information on their mobile devices through business apps. 1

Sources:

  1. http://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report2013.pdf
  2. http://www.securelist.com/en/analysis/204792332/IT_threat_evolution_Q1_2014
  3. http://www.infosecurity-magazine.com/view/32779/the-effect-of-byod-on-information-security/
  4. http://info.watchdox.com/rs/watchdox/images/WatchDoxWhite PaperFINAL2.pdf
  5. http://antivirus.about.com/od/antivirusvendors/fl/Shadow-IT-ndash-Trends-Impacting-Your-Security-Posture.htm
  6. http://it-tna.com/2013/08/25/coming-out-of-the-it-shadow-is-it-a-threat-a-cure-or-both/
  7. http://www.cioinsight.com/security/slideshows/shadow-its-growing-footprint.html

Download a printable PDF