8914 Stone Green Way , Louisville, Kentucky 40220-4072

Support: (502) 473-6407 | Sales: (502) 473-9330

Argentum IT

Get Support

  • Home
    • Login / Logout
    • Create an Account
    • My Support Portal
    • My Subscriptions
    • Downloads
    • Billing Portal
    • My Virtual Desktop
    • Sitemap
    • Privacy Policy
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Video Gallery
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring & Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • VMware
      • 24/7 Help Desk
      • Microsoft Hyper-V
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Barracuda Total Email Protection
      • Cisco-Certified Solutions
      • Fully Hosted Security as a Service
      • Enterprise Mobility Management Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Microsoft Azure
      • Cloud Hosted VoIP
    • Industry Specific
      • Healthcare IT
      • IT for Law
      • Manufacturing IT
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
      • Supply Chain and Logistics
      • eManagement Solutions
      • IT for Nonprofits
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • HP Official Dealer
      • Printer Management
      • Lenovo Official Reseller
      • Printer and Copier Support
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • Microsoft SharePoint
      • Microsoft SQL Server
      • Microsoft Partner Network
      • Document Management
      • Identity Management
      • Intranet Solutions
    • Business Communication
      • VoIP
      • Mobile Solutions
      • Fax Server
      • Conferencing
      • Unified Communications
      • Conferencing and Collaboration
    • Media & Internet Services
      • Website Design
    • Cybersecurity
      • Cybersecurity Overview
      • Network Security
      • Business Security
      • Unified Threat Management
      • Endpoint Security Solutions
      • Asset Tracking
      • Mobile Device Management
      • Email Encryption
      • Multi-Factor Authentication
      • Spam Protection
      • Content Filtering
      • Phishing Simulation
      • Dark Web Monitoring
      • Penetration Testing
      • Compliance Standards
    • Surveillance and Access Control
      • Access Control Solutions
      • Security Cameras
  • Understanding IT
    • Blockchain
    • GDPR Compliance
    • Automation
    • Ransomware
    • Shadow IT
    • Your Virtual Identity
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • The Internet of Things
    • Network Security
    • SOX
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing
  • News
    • News & Press Releases
    • Our Newsletters
  • Blog
  • Support
    • How to Request Support
    • Help Desk
    • Remote Support Tool
  • Contact us

Newsletter Content

Argentum IT LLC Blog

Argentum IT LLC has been serving the Louisville area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Home
Categories
Tags
Categories:   All Categories
Suggested keywords
x
Search

Situations Can Quickly Deteriorate When Employees Attempt to Resolve IT Issues

Newsletter
Dean Lause
Thursday, 22 September 2016
0 Comments
Situations Can Quickly Deteriorate When Employees Attempt to Resolve IT Issues

In a world where businesses either pride themselves on their security solutions, or have woefully unsecured networks, you need to understand that one of the most common threats to sensitive corporate data comes from within your organization. User error is the leading cause of data loss and security-related problems, although, it’s important to remember that they often have good intentions that may result in an unfortunate outcome.


One way this happens is with what’s called shadow IT. This is the implementation of technology solutions that may not be sanctioned by your organization’s IT department. For example, an employee might choose to download a free antivirus if they see that their workstation’s antivirus software license has expired. Or, if they don’t have a word processing solution, they may look for alternatives on the Internet. While they may have only good intentions when implementing the solution, this can lead to several security discrepancies that could put your data at risk.

Another way that this might happen is when an employee is working hard on a project in order to meet a deadline, but the software license expires and they are no longer able to access the tools they need to continue working. Rather than go through the proper channels (especially if IT is bogged-down with work, and is unresponsive to urgent requests), the employee might choose to take matters into their own hands and find a solution that works. The employee can now get back to doing their job, but they’ve just implemented shadow IT, which is a major red flag for businesses.

When it comes to shadow IT, the primary concern is the source of the solution. Where did the software that your employee found come from? Depending on what exactly they downloaded, it could be a seemingly-benign open-source software from a reputable website. However, if they found it on some ad-encrusted sketchy corner of the Internet, you might be in trouble. Freeware is often exploited by hackers to spread their influence, knowing full well that people will download it and use it, rather than pay for a software license from a reputable vendor.

The best way to prevent shadow IT is to control the permissions that you provide for your employees on their workstations. Downloading a new software solution often requires administrator permission, so when you remove these permissions from a workstation, you’re forcing the employee to go through the proper channels when requesting a new software to work with. It also helps to educate your employees on how to use the technology solutions your business has adopted--as another reason why they might choose to use something different could be the fact that they’re unfamiliar using other applications.

In general, having a responsive IT department can minimize the trouble that your team has with its IT solutions can be a great deterrent for shadow IT. When they don’t run into hiccups, and they are comfortable using your business’s technology solutions, they won’t feel the need to implement additional solutions that can put your company’s data at risk.

To learn more about shadow IT, and the threats that it poses for your business, reach out to us at (502) 473-6407.

Tags:
Shadow IT Business Security

About the author

Dean Lause

Dean Lause

Dean Lause is a technologist to the highest degree. When he was in middle school, he learned and developed small programs using BASIC programming code on his Commodore 64. He was one of the first to post to bulletin boards on the newly emerging “Internet” and built a mini-network in his home. He competed in his senior year of high school, placing 1st regionally, 2nd in State and 17th Nationally in computer specialist competitions. Today, he enjoys technology as much as he did then. In fact, he has a “Smart Home,” with connected devices controlled by A.I., mobile apps, and voice commands. When he is ready to go to sleep, all he needs to say is “Good night,” and Voila! all of the lights in the entire house turn off, the doors lock, the TV/DVR turn off, the house alarm is set and the alarm clock for the morning is ready to go! After a 4-year stint in the Army as a computer specialist, Dean spent the next 20 years in Fortune 500 Enterprise IT environments. He quickly building his IT skill set, becoming an expert in VMWare and Citrix and various other technologies. Dean served as the Director of Network Infrastructure & Security of North American Operations in his last role before joining Argentum IT and completing his MBA with a specialty in Accounting in 2011. Dean understands not only the technical side of how devices work together and integrate within an environment, but also understands and designs the environment from a business point of view for productivity. He strives to provide cost-savings, efficiency and practicality to solve the real issues that are present for each individual client he works with. Leveraging his 20+ years’ of enterprise-level experience, for the past ten years, Dean has consulted with numerous Fortune 500 companies across the country on issues relating to network infrastructure and security, Citrix XenDesktop, VMWare implementation and capacity planning, Office 365/Exchange Email Migrations as well as Mobile Device Management and Disaster Recovery Planning. He has also been engaged to develop and improve technology processes as well as accomplish technology projects on time and budget. Today, Dean uses all of these skills and more to aid small to medium-sized businesses to utilize technology to run their companies more profitably and efficiently. As Chief Technical Officer of Argentum IT, LLC for the past ten years, Dean has supervised a proactive service desk who educates clients on technology best practices, designed multiple infrastructure environments for clients (both big and small), to fit their needs and built a sizeable hosted infrastructure environment – including VMWare and Citrix “products”. Dean’s breadth of experience affords him a unique view of IT and business challenges, which allows him to help customize and develop unique solutions to solving IT and Cyber Security challenges.

Author's recent posts

More posts from author
Thursday, 29 May 2025 How to Hit the Sweet Spot Between Innovation and Frugality
Tuesday, 27 May 2025 Modern Technology is Key to Contemporary Business Competition
Saturday, 17 May 2025 Why Up-to-Date IT is Essential
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Sunday, 18 May 2025

Captcha Image

Customer Login

Remember me
  • Forgot your password?
  • Create an account

News & Updates

On A Mission To Simplify IT, Dean Lause Turned His Parents IT Struggles Into Inspiration And Became The Premier IT Solution For Small and Medium Sized Businesses in Louisville, Kentucky

Back in the 1980’s, despite owning one of the first home computers, the Tandy TRS-80, society found technology more of a hindrance than a help. But Dean loved technology and from an early age understood it could help.

Read More

Contact us

Learn more about what Argentum IT can do for your business.

(502) 473-6407

Argentum IT
8914 Stone Green Way
Louisville, Kentucky 40220-4072

Copyright Argentum IT. All Rights Reserved.

Powered by JoomConnect
  • Home
    • Login / Logout
    • Create an Account
    • My Support Portal
    • My Subscriptions
    • Downloads
    • Billing Portal
    • My Virtual Desktop
    • Sitemap
    • Privacy Policy
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Video Gallery
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring & Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • VMware
      • 24/7 Help Desk
      • Microsoft Hyper-V
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Barracuda Total Email Protection
      • Cisco-Certified Solutions
      • Fully Hosted Security as a Service
      • Enterprise Mobility Management Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Microsoft Azure
      • Cloud Hosted VoIP
    • Industry Specific
      • Healthcare IT
      • IT for Law
      • Manufacturing IT
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
      • Supply Chain and Logistics
      • eManagement Solutions
      • IT for Nonprofits
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • HP Official Dealer
      • Printer Management
      • Lenovo Official Reseller
      • Printer and Copier Support
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • Microsoft SharePoint
      • Microsoft SQL Server
      • Microsoft Partner Network
      • Document Management
      • Identity Management
      • Intranet Solutions
    • Business Communication
      • VoIP
      • Mobile Solutions
      • Fax Server
      • Conferencing
      • Unified Communications
      • Conferencing and Collaboration
    • Media & Internet Services
      • Website Design
    • Cybersecurity
      • Cybersecurity Overview
      • Network Security
      • Business Security
      • Unified Threat Management
      • Endpoint Security Solutions
      • Asset Tracking
      • Mobile Device Management
      • Email Encryption
      • Multi-Factor Authentication
      • Spam Protection
      • Content Filtering
      • Phishing Simulation
      • Dark Web Monitoring
      • Penetration Testing
      • Compliance Standards
    • Surveillance and Access Control
      • Access Control Solutions
      • Security Cameras
  • Understanding IT
    • Blockchain
    • GDPR Compliance
    • Automation
    • Ransomware
    • Shadow IT
    • Your Virtual Identity
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • The Internet of Things
    • Network Security
    • SOX
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing
  • News
    • News & Press Releases
    • Our Newsletters
  • Blog
  • Support
    • How to Request Support
    • Help Desk
    • Remote Support Tool
  • Contact us