/
/

Public Sector IT in 2022: Confronting Shadow IT in a Hybrid World

by NinjaOne
Public Sector Shadow IT

Key Points

  • Shadow IT Risks – Unauthorized devices, apps, and cloud tools are widespread in public sector IT, creating major security and compliance threats.
  • Hybrid Work Impact – Remote and hybrid work has fueled shadow IT growth, increasing device sprawl and cyberattack vulnerabilities.
  • Survey Findings – 52% of employees bypass security policies, 52% use unapproved devices, and 49% rely on unauthorized software.
  • Data & Citizen Safety – Weak IT oversight risks breaches, regulatory fines, and exposure of sensitive citizen information.
  • Solutions Needed – Public sector IT leaders must improve device management, enforce policies, and foster collaboration between employees and IT to reduce shadow IT.

The public sector hasn’t always had a reputation for digital agility and modern hardware, but that’s beginning to change thanks to COVID-19. Forced to operate from home, public sector employ a mix of devices and cloud strategies to keep city services running. However, these advances could be fueling shadow IT within public sector organizations and leaving them vulnerable to data leakage, theft, or attack.

Reduce shadow IT risk with a reliable endpoint management platform.

Discover NinjaOne’s powerful tools

To better understand the ways public sector employees are engaging with technology in the workplace and their attitude towards security, NinjaOne has released its new report, Public Sector IT In 2022: Confronting Shadow IT In A Hybrid World, based on a survey of 400 public sector managers across the United States, Europe, and Oceania.

What is Shadow IT?

To set the stage for our discussion, let’s first explore the concept of shadow IT.

Shadow IT refers to any software or hardware utilized within an organization without the IT department’s awareness or approval. This can encompass everything from personal devices to unauthorized applications.

While some users turn to shadow IT to enhance their workflows and improve productivity, it poses significant risks to the security and integrity of the IT environment.

The lack of oversight means administrators are often unaware of these additions, making managing potential issues stemming from shadow IT challenging.

This situation is particularly alarming in public sector IT, where sensitive state and local government data may be vulnerable to these risks.

The scope of the shadow IT problem

The survey found that while many state and local government agencies are regaining a sense of normalcy, most are embracing a hybrid approach. This shift has drastically increased the volume of devices IT teams need to monitor and manage. Unfortunately, some devices and government software, are slipping through the cracks, enabling shadow IT to spread.

Here are some key stats that show how widespread shadow IT is:

  • 52% of public sector employees felt they had to frequently or occasionally go around their organization’s security policies to do their jobs
  • 52% use unapproved devices for work
  • 49% use unapproved software or cloud tools for work
  • 51% of public sector employees are spending more time on IT issues since working from home 

With so many threats to manage, not prioritizing device management and security dramatically increases the risk an organization faces. Allowing weak links to persist represents a willingness to invite cyberattacks and regulatory fines. Plus, it can put citizens’ personal information at risk – harming the same people those in the public sector work hard day and night to support.

Standardize device and software control across your hybrid workforce.

Try NinjaOne for free

What needs to happen

Allowing shadow IT to persist may seem harmless, but it has real consequences.

Public sector IT leaders need to focus on facilitating dialogue between employees and IT staff to understand what isn’t working regarding security policies and turn to technology to make device and user management unintrusive.

To learn more, download the full report:

FAQs

Shadow IT refers to employees using unauthorized devices, apps, or cloud services without IT approval—creating serious risks for government data security.

It exposes sensitive citizen data, increases vulnerability to cyberattacks, and can lead to compliance violations and regulatory fines.

Remote and hybrid setups expanded device usage and cloud reliance, making it harder for IT teams to monitor and control unauthorized tools.

Over half of public sector employees bypass security policies, use unapproved devices, or rely on unauthorized software to complete their work.

Weak IT oversight may expose personal information, putting citizens at risk of identity theft or data misuse.

They should improve device management, deploy endpoint security, simplify compliance policies, and encourage open communication with employees.

Modern endpoint management and automated IT solutions provide visibility, reduce risks, and balance security with productivity.

You might also like

Ready to simplify the hardest parts of IT?