Skip to main content

Kaspersky uncovers the risks unauthorized IT products pose to businesses

December 20, 2023

Woburn, MA – December 20, 2023 — A recent study has found that businesses are at an increased risk of becoming targets of cyber incidents due to the use of shadow IT by their employees amid the growing trend towards a distributed workforce. Further, Kaspersky research has found 86% of companies in the U.S. suffered cyber incidents in the last two years, and 13% of these were caused by the use of shadow IT.

What is shadow IT? 

Shadow IT is the part of the company’s IT infrastructure that is outside the purview of the IT and information security departments that is not being used in accordance with information security policies. Deployment and operating shadow IT can lead to serious negative outcomes for businesses. Many instances of cyberattacks as a result of shadow IT were found in Kaspersky’s study that revealed that the IT industry had been hit the hardest suffering 16% of cyber incidents due to the unauthorized use of shadow IT in 2022 and 2023. Other sectors hit by the problem were critical infrastructure and transport & logistics organizations (13%). 

In the recent case of Okta, the dangers of using shadow IT are on full display. This year, an employee using a personal Google account on a company-owned device unintentionally allowed threat actors to gain unauthorized access to Okta’s customer support system. There they were able to hijack files containing session tokens that could then be used to conduct attacks. This cyber incident lasted for 20 days and impacted 134 company’s customers according to Okta’s report.

Outlining ‘blurry shadows’

When companies are looking for shadow IT use among employees, what should they be looking for? These can be either unauthorized applications installed on employee computers, or unsolicited flash drives, mobile phones, laptops, etc.

However, there are also some options that are less conspicuous. One example of this is abandoned hardware left over after the modernization or reorganization of the IT infrastructure. It can be used ‘in the shadows’ by other employees, acquiring vulnerabilities that will sooner or later find their way into the company’s infrastructure.

Regarding IT specialists and programmers, as it often occurs, they can create a tailored programs themselves to optimize work within a team/department, or to solve internal problems, making work faster and more efficient. However, they don’t always ask to the information security department for authorization to use these programs, and this could have disastrous consequences.

“Employees who use applications, devices or cloud services that are not approved by the IT-department, believe that if those IT-products come from trusted providers, they should be protected and safe,” said Alexey Vovk, head of information security at Kaspersky. “However, in the ‘terms and conditions’ third-party providers use the so-called 'shared responsibility model'. It states that, by choosing 'I agree' users confirm that they will perform regular updates of this software and that they take responsibility for incidents related to the use of this software (including corporate data leakages). But at the end of the day, business needs tools to control the shadow IT when it’s used by employees. The information security department will of course still need to conduct regular scans of their company’s internal network to avoid the unauthorized use of uncontrolled and unsafe hardware, services and software applications.”

The widespread usage of shadow IT is complicated by the fact that many organizations do not have any documented sanctions where their employees will suffer as a consequence of going against IT policies in this matter. Moreover, it is assumed that shadow IT could become one of the top threats to corporate cybersecurity by 2025. The good news is that the motivation for employees to use shadow IT is not always malicious, even more often, it’s the opposite. Employees in many cases use this as an option to expand the functionality of the products they use at work because they believe that the set of allowed software is insufficient, or they simply prefer the familiar program from their personal computer. 

To mitigate the risks of using shadow IT in an organization, Kaspersky recommends:

  • Ensure cooperation between the business and IT departments to regularly discuss new business needs, obtain feedback on the IT services used, in order to create new and improve existing IT services needed by the business.
  • Regularly conduct an inventory of IT assets and scan your internal network to avoid the appearance of uncontrolled hardware and services.
  • When it comes to personal employee devices, it's best to give users as limited access as possible to only the resources they need to do their job. Use an access control system that will only allow authorized devices onto the network.
  • Carry out training programs to improve the information security literacy of employees. To boost security awareness among employees, educate them with the Kaspersky Automated Security Awareness Platform training program, which teaches safe internet behavior.
  • Invest in relevant training programs for IT security specialists. Kaspersky Cybersecurity for IT Online training helps build up simple yet effective IT security-related best practices and simple incident response scenarios for generalist IT admins, while Kaspersky Expert Training equips your security team with the latest knowledge and skills in threat management and mitigation.
  • Use products and solutions that allow you to control the use of shadow IT within your organization. Kaspersky Endpoint Security for Business and Kaspersky Endpoint Security Cloud offer Application, Web and Device controls which limit the use of unsolicited apps, websites and peripherals, significantly reducing infection risks even in cases where employees use shadow IT or make mistakes due lack of cybersafe habits.
  • Regularly conduct an inventory of IT assets to eliminate the appearance of abandoned devices and hardware.
  • Organize a centralized process for publishing self-written solutions so that IT, so Information Security specialists learn about them in a timely manner.
  • Limit the work of employees with third-party external services and if possible, block access to the most popular cloud information exchange resources.

About Kaspersky

Kaspersky is a global cybersecurity and digital privacy company founded in 1997. Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection, specialized security products and services, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky technologies and we help over 220,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

Media Contact:

Cassandra Faro

Cassandra.Faro@Kaspersky.com

781-503-1812

Kaspersky uncovers the risks unauthorized IT products pose to businesses

Kaspersky logo

About Kaspersky

Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection, specialized security products and services, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help over 200,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

Related Articles Press Releases