Thursday, January 22, 2015

Shadow IT: The five biggest mistakes CIOs make


shadow-it.jpg

Shadow IT, in which companies allow staff to choose their digital tools, is an opportunity and a threat. And like consumerization in the enterprise, it is almost impossible for a company to stop when employees have problems to solve and a wide variety of readily-accessible apps and tools just a credit card and a mouse click away.

KeyedIn's Karen Adame discusses CIOs' mistakes regarding shadow IT, which are even worse when firms do not coordinate their analysis and end up with different versions of the truth. 

  1. Allowing shadow IT systems to impede workflow
  2. Failing to ensure proper training to secure information and prevent data loss
  3. Not providing the right tools to enable efficient data management
  4. Failing to control spreadsheet versions and ensure analytical consistency
  5. Not getting the full return on IT investments

A1: That's where we get to people all wanting to do things differently. Within our environment, we use SharePoint, and I am constantly pushing people to not email documents around, but to push them up to SharePoint, so that everyone can look at the same thing. What happens is that we see people are off doing their own little things, and then when you try to bring it all together, we spend 10 times longer trying to reconcile whatever the data was, or the process. If all the constituents on specific workflows got together, and had their little shadow IT but did it together, it would probably work better, compared to what happens when everyone does their own thing.

A2: It is really critical. Certainly everybody is intent on data security and data management. I think a lot of people who are outside the IT world don't realize how much potential risk they are putting company data and other data in. They think it is all secure, when it is really not. It is really about making sure that they all understand. We often get the question, why does my password have to be so complicated? But the thing is we have customer information in there and proprietary company information in there. And it is the same thing when people start using spreadsheets, and external systems to create processes, or to track information. They are not thinking about the fact that it needs to be secure.

If I am emailing out an HR payroll list, whether I'm emailing it to the CEO or to someone else, it doesn't matter, I probably want to put a password on that spreadsheet, so that if someone else gets in their email, they can't open it. People don't really think about a lot of those things, and it is important that people understand there is a reason and a logic.

We are not just doing it because we want to annoy you -- we are really trying to protect all of our data. Customer data is really the most critical information that we can store and manage.

A3: It depends on what tools you give people access to. There are a lot of companies, for example, that may provide Microsoft Access as a tool and build a database out of it, but they are not really managing it well. So we are not finding the right tools for people to do some of these little shadow IT things that make sense.

Any time you are accessing data and moving it around, you are opening up your self to all of those security issues, so we want to make sure that everything we have is secure, but still want to provide all the tools to our employees to build the things that they need.

For example, we use KeyedIn Projects for our project management, for our customer billing, and our consulting projects. Here we have a good tool that we can provide to our employees, and can also use it to manage development projects, and internal and financial projects. So this is a tool that is going to enable our employees to do what they need to do and get it done, and it is a secured environment. And that's an example of a tool that I can access on my iPad later on. So we try to provide internally all the tools that people need, whether it is something like that, or whether it is our implementation of our CRM system, or our internal development platform.

A4: That probably should be number one!

Having spreadsheets out there that people are using, that are not the same spreadsheets other people are using for their analytics is a problem. Say somebody emails a spreadsheet to me, and I make some changes on it, and then person A now sends their version to person C, and you end up asking after all these versions, what is the truth? You really fall into a lot of problems with that, and it comes back to what we talked about the data efficiency and training for that. You now have two different versions of the truth, and there is nothing worse in any company when you have two different versions of the truth.

A5: Obviously, every company is spending a lot of time, energy, and money investing in different IT channels. And again, it could be anything from the financial software that they choose, to CRM, or other tools. It is really making sure that we are leveraging the tools that we have, and whether we need to make some improvements to them. I would much rather make an improvement to the tool for the entire company than have someone run off and do something on their own, because they don't like what we've got. And in the end, that always costs more money, and the whole lack of integration of the tools -- it's just a black hole that money falls into for a number of different reasons. If we are going to invest in these different tools, then let's use them, or let's avoid investing in them in the first place.

Sent iPadn Ť€©ћ№©¶@τ

No comments:

Post a Comment