Federal information technology leaders can avoid the potential security risks of shadow IT activities within their agencies by implementing multiple strategies, Joel Dolisy, chief information officer and chief technology officer of SolarWinds, wrote in an opinion piece published Friday on GCN.
Dolisy recommended that agency IT managers create a watch list of suspicious or unauthorized devices and use Internet protocol management and user device tracking tools to identify who and what are accessing the network.
He also urged agencies to monitor system anomalies, bandwidth usage and log files with automated platforms.
It is also important that agency employees are informed about policies concerning the use of unsanctioned IT devices and systems in the workplace, according to Dolisy.
He added that agencies should limit access to hosted services for enterprise data sharing, applications and email because they can put their infrastructure at risk.