Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

Majority of CEOs Knowingly Raise Risk Level With Their Shadow IT

Despite the increased risk shadow IT poses to security, a majority of CEOs surveyed say they are willing to take the risk, according to a survey released today.

A majority of CEOs are willing to put their organizations at risk by using shadow IT, even though they are well aware of the potential security fallout, according to a report released today by Code42, a cloud-based security company.

The survey of 1,205 IT and business decision makers revealed 75% of CEOs surveyed acknowledge using applications and programs not sanctioned by their IT departments, despite 91% of surveyed CEOs acknowledging this behavior could put their organization at a security risk, the study found.

When the top dog behaves in such a cavalier fashion, it can potentially set the tone for the entire organization, says Rick Orloff, chief security officer for Code42.

If employees see the CEO doing their own thing, it gives them a sense of entitlement and contributes to the friction with the security team and employees feel they don't have to comply with policies and best practices, Orloff says.

He added there is also an additional impact to the company.

"When CEOs behave this way, then the CISO is not reporting high enough into the organization. CISOs should ideally report into the CEO and not the CIO," says Orloff. "I bring this up because when the CISO reports directly into the CIO, there is an air gap between the CISO and senior leadership. When you remove the air gap, then you don't have the shadow IT."

Without the air gap, a CISO can work with the CEO to find the tools needed to do the job using existing authorized technology, or bring in the right secure tool onto the platform, Orloff explains.

Driving this behavior to use shadow IT is a desire by CEOs and other company executives to put convenience and productivity ahead of security, the study found. This long-held mantra of productivity over security is nothing new when it comes to rank-and-file workers, but for top-level management to knowingly disregard best security practices is somewhat surprising, considering that they recognize there is a risk, and that these executives themselves are increasingly held accountable for security breaches.

Although 83% of surveyed business decision makers are well-aware of the security risks that their actions pose when using shadow IT, they are nonetheless willing to take such action under these circumstances. According to the survey, respondents would:

  • Use an unapproved application or program if it would improve their productivity (65%)
  • Use shadow IT if it would make their lives easier (52%)
  • Use it because the IT department does not understand what is needed to get a job done (27%)

But the figures that surprised Orloff the most were the percentage of CEOs who knew use of shadow IT was a security risk. "I expected it to be around 35% and 40%," he says, versus the 75% and 91% figures in the survey.

The survey also found that business executives tend to be more concerned than IT security executives that a major data breach will happen in the near future. For example, while roughly half of business decision-makers and also IT leaders say they encountered a security breach in the past 18 months, of those who have not, 88% of company executives versus 50% of IT decision makers expect a breach to go public in the next 12 months, the study found.

Business decision makers expecting a public breach within the next 12 months may have more heightened concern than their IT department because they have heard about the sizable breaches hammering companies over the past 18 months and do not understand their own company's security footprint, says Orloff.

Although business executives and IT professionals have a gap when estimating the next breach, their differences are narrower when it comes to the likelihood their companies would face serious repercussions if they lost all their corporate data held on endpoint devices. The survey found that 90% of IT and business executives believe it could be serious to potentially fatal for their organizations, with 88% of IT executives and 83% of business decision makers finding their companies need to shore up their breach recovery abilities in the next year.

Related Stories:

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Another COVID-19 Side Effect: Rising Nation-State Cyber Activity
Stephen Ward, VP, ThreatConnect,  7/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-3931
PUBLISHED: 2020-07-08
Buffer overflow exists in Geovision Door Access Control device family, an unauthenticated remote attacker can execute arbitrary command.
CVE-2020-15600
PUBLISHED: 2020-07-07
An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password.
CVE-2020-15599
PUBLISHED: 2020-07-07
Victor CMS through 2019-02-28 allows XSS via the register.php user_firstname or user_lastname field.
CVE-2020-8916
PUBLISHED: 2020-07-07
A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the service (DoS). We recommend updating, or to res...
CVE-2020-12821
PUBLISHED: 2020-07-07
Gossipsub 1.0 does not properly resist invalid message spam, such as an eclipse attack or a sybil attack.