Public Sector IT in 2022: Confronting Shadow IT in a Hybrid World

Monitor, manage, and secure any device, anywhere

NinjaOne gives you complete visibility and control over all your devices for more efficient management.

See how

Too many tools in too many places?

See how tool sprawl impacts IT and what you can do to solve it.

Read the guide
NinjaOne      

The public sector hasn’t always had a reputation for digital agility and modern hardware, but that’s beginning to change thanks to COVID-19. Forced to operate from home, public sector employees are employing a mix of devices and cloud strategies to keep city services running. However, these very same advances could be fueling shadow IT within public sector organizations and leaving them vulnerable to data leakage, theft, or attack.

To better understand the ways public sector employees are engaging with technology in the workplace and their attitude towards security, NinjaOne has released its new report, Public Sector IT In 2022: Confronting Shadow IT In A Hybrid World, based on a survey of 400 public sector managers across the United States, Europe, and Oceania.

The scope of the shadow IT problem

The survey found that while many state and local government agencies are regaining a sense of normalcy, most are embracing a hybrid approach. This shift has drastically increased the volume of devices that IT teams need to monitor and manage. Unfortunately, some devices, as well as software, are slipping between the cracks and enabling shadow IT to spread.

You’ll have to check out the report to get a complete view of the findings and recommendations, but here are some key stats that create a clearer picture of how widespread shadow IT is:

  • 52% of public sector employees felt they had to frequently or occasionally go around their organization’s security policies to do their jobs
  • 52% use unapproved devices for work
  • 49% use unapproved software or cloud tools for work
  • 51% of public sector employees are spending more time on IT issues since working from home 

With so many threats to manage, not prioritizing device management and security dramatically increases the risk an organization faces. Allowing weak links to persist represents a willingness to invite cyberattacks and regulatory fines. Plus, it can put the personal information of citizens at risk – harming the same people those in the public sector work hard day and night to support.

What needs to happen

Allowing shadow IT to persist may seem harmless at first glance, but it has real consequences.

Public sector IT leaders need to focus on facilitating dialogue between employees and IT staff to understand what isn’t working when it comes to security policies and turn to technology to make device and user management unintrusive.

To learn more, download the full report:

Next Steps

Building an efficient and effective IT team requires a centralized solution that acts as your core service deliver tool. NinjaOne enables IT teams to monitor, manage, secure, and support all their devices, wherever they are, without the need for complex on-premises infrastructure.

Learn more about Ninja Endpoint Management, check out a live tour, or start your free trial of the NinjaOne platform.

Monitor, manage, and secure any device, anywhere

NinjaOne gives you complete visibility and control over all your devices for more efficient management.

See how

Too many tools in too many places?

See how tool sprawl impacts IT and what you can do to solve it.

Read the guide