Watch Demo×
×

See NinjaOne in action!

By submitting this form, I accept NinjaOne's privacy policy.

Public Sector IT in 2022: Confronting Shadow IT in a Hybrid World

Public Sector Shadow IT

Public Sector Shadow IT

The public sector hasn’t always had a reputation for digital agility and modern hardware, but that’s beginning to change thanks to COVID-19. Forced to operate from home, public sector employees are employing a mix of devices and cloud strategies to keep city services running. However, these very same advances could be fueling shadow IT within public sector organizations and leaving them vulnerable to data leakage, theft, or attack.

To better understand the ways public sector employees are engaging with technology in the workplace and their attitude towards security, NinjaOne has released its new report, Public Sector IT In 2022: Confronting Shadow IT In A Hybrid World, based on a survey of 400 public sector managers across the United States, Europe, and Oceania.

The scope of the shadow IT problem

The survey found that while many state and local government agencies are regaining a sense of normalcy, most are embracing a hybrid approach. This shift has drastically increased the volume of devices that IT teams need to monitor and manage. Unfortunately, some devices, as well as software, are slipping between the cracks and enabling shadow IT to spread.

You’ll have to check out the report to get a complete view of the findings and recommendations, but here are some key stats that create a clearer picture of how widespread shadow IT is:

  • 52% of public sector employees felt they had to frequently or occasionally go around their organization’s security policies to do their jobs
  • 52% use unapproved devices for work
  • 49% use unapproved software or cloud tools for work
  • 51% of public sector employees are spending more time on IT issues since working from home 

With so many threats to manage, not prioritizing device management and security dramatically increases the risk an organization faces. Allowing weak links to persist represents a willingness to invite cyberattacks and regulatory fines. Plus, it can put the personal information of citizens at risk – harming the same people those in the public sector work hard day and night to support.

What needs to happen

Allowing shadow IT to persist may seem harmless at first glance, but it has real consequences.

Public sector IT leaders need to focus on facilitating dialogue between employees and IT staff to understand what isn’t working when it comes to security policies and turn to technology to make device and user management unintrusive.

To learn more, download the full report:

Next Steps

Building an efficient and effective IT team requires a centralized solution that acts as your core service deliver tool. NinjaOne enables IT teams to monitor, manage, secure, and support all their devices, wherever they are, without the need for complex on-premises infrastructure.

Learn more about NinjaOne Endpoint Management, check out a live tour, or start your free trial of the NinjaOne platform.

You might also like

Ready to become an IT Ninja?

Learn how NinjaOne can help you simplify IT operations.

NinjaOne Terms & Conditions

By clicking the “I Accept” button below, you indicate your acceptance of the following legal terms as well as our Terms of Use:

  • Ownership Rights: NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms.
  • Use Limitation: You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party.
  • Republication Prohibition: Under no circumstances are you permitted to re-publish the script in any script library belonging to or under the control of any other software provider.
  • Warranty Disclaimer: The script is provided “as is” and “as available”, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations.
  • Assumption of Risk: Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks.
  • Waiver and Release: You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script.
  • EULA: If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).