Security Market Segment LS
Wednesday, 27 March 2019 11:21

Employees continue to use 'unauthorised' tools to get their job done


A recent survey by digital workplace solutions provider Igloo found that a significant portion of employees at any workplace would "upgrade" their software environment in order to actually get their job done, with obvious security implications.

Igloo's recent report (PDF) analysed survey results from about 2000 employees at workplaces with more than 250 employees.

This report covers a number of aspects of employee's IT needs, but one of the highlights was the observation that "sensitive documents are frequently stored and shared via email and instant message, and more secure methods that track user access and support the use of watermarks are rarely used. Additionally, employees continue to rely on non-approved applications because they are easy to use and, in some cases, because they are less likely to be monitored or tracked by their employers. The survey also found the number of employees satisfied with the apps and tools provided by their companies decreased from last year". The survey was previously run 12 months ago.

The survey attempted to probe deeper into this aspect. "Ninety-one percent of employees feel confident their knowledge sharing tools would only allow access to authorized individuals. This encouraging finding suggests teams trust the tools their companies have provided will keep data safe. However, it doesn't always mean the same employees are actually using the provided tools to do their jobs. Despite confidence in the security of their companies' tools and systems, employee behaviour is risky when it comes to sharing sensitive or private information. Sixty-nine percent admit to using email to store or share this information, while 26% have used instant messaging and just 14% use secure FTP."

The report goes on to suggest that respondents claim to be saving around 3 hours per week by using these non-approved applications.

Methods to Share

Igloo offers businesses (and their IT teams) some thoughts on how to address this "shadow IT" problem.

The first thing is to run an anonymous survey, with very clear objectives that the intention is not to punish or remove applications, but to understand where IT has 'missed the boat' in the tools offered and how the suite might be improved.

Next, determine why these additional tools are being used. Is there a gap in the software provided by IT? Are different tools faster, better, more efficient?

Finally, offer training – perhaps one of the reasons that employees use a particular non-approved tool is that they know it well and simply haven't bothered learning the correct one. Perhaps they didn't know that the tool provided actually had the features they desire.

Above-all, IT teams need to be sure they present themselves as supporters of the business, not disablers.


Recently iTWire remodelled and relaunched how we approach "Sponsored Content" and this is now referred to as "Promotional News and Content”.

This repositioning of our promotional stories has come about due to customer focus groups and their feedback from PR firms, bloggers and advertising firms.

Your Promotional story will be prominently displayed on the Home Page.

We will also provide you with a second post that will be displayed on every page on the right hand side for at least 6 weeks and also it will appear for 4 weeks in the newsletter every day that goes to 75,000 readers twice daily.



Some of the most important records are paper-based documents that are slow to issue, easy to fake and expensive to verify.

Digital licenses and certificates, identity documents and private citizen immunity passports can help you deliver security and mobility for citizens’ information.

Join our webinar: Thursday 4th June 12 midday East Australian time


David Heath

David Heath has had a long and varied career in the IT industry having worked as a Pre-sales Network Engineer (remember Novell NetWare?), General Manager of IT&T for the TV Shopping Network, as a Technical manager in the Biometrics industry, and as a Technical Trainer and Instructional Designer in the industrial control sector. In all aspects, security has been a driving focus. Throughout his career, David has sought to inform and educate people and has done that through his writings and in more formal educational environments.



Recent Comments