Skip to content

Hiding in the Shadows

A tech veteran’s guide to protecting your company from network attacks.

By Scott Ecker October 23, 2025

A red unlocked padlock icon overlays a dimly lit laptop with a person’s hands typing, symbolizing a data breach or cybersecurity threat—an urgent reminder for IT teams to strengthen network security measures.
Image by Song_about_summer / Shutterstock

This article originally appeared in the September/October 2025 issue of Seattle magazine.

What is Shadow IT?

When you first hear the term Shadow IT, it might sound vaguely ominous or even downright dangerous. And it can be. In simple terms, Shadow IT describes when an employee—or even an entire department within an organization—circumvents the IT team’s best practices and safety protocols to implement a change such as adding a device, software, or new accounts to their network.

It happens every day in networked organizations. Shadow IT is usually introduced by a well-meaning individual just trying to do their job. They decide that going through the official IT channels will slow things down, so they plug in an external device from home or download a free software program.

They might not realize it, but the consequences can be far-reaching, and sometimes even catastrophic for an organization. Enetics Networks receives most of its referrals from companies that had their operations compromised due to Shadow IT.

Why do Shadow IT networks exist?

There is often tension between the needs of individual employees or departments and the needs of the IT team. While employees look for ways to maintain or optimize their productivity, the IT team protects the network and ensures the organization continues to operate smoothly.

One of the most common reasons employees go rogue and set up their own IT solutions is that they think the IT department will take too long. According to a report by HP Wolf Security, nearly half (48 percent) of office workers surveyed said that they felt security measures were a waste of time. This mindset is a particular challenge with our future workforce; among office workers ages 18-24, that figure rose to 64 percent.

What’s the problem with Shadow IT?

For all industries, but especially those that are highly regulated, data security is a constant concern. When employees introduce new elements into the cybersecurity network that the IT team isn’t aware of, it can put the entire network at risk.

Remote access software is a good example of a Shadow IT vulnerability. It’s used routinely by employees who work offsite, but if the software and permissions aren’t maintained and monitored regularly, they might become conduits to a network breach. One of the most famous of this is the hack of a Florida city’s water treatment plant in February 2021. The attacker appeared to have used remote access software TeamViewer, which an employee had on their computer. Once inside the system, the attacker dramatically increased the levels of sodium hydroxide, also known as lye, set to be released into the city’s water supply. Luckily the attack was detected and reversed before that happened, but the incident offers a terrifying cautionary tale.

How can organizations minimize Shadow IT blind spots?

When businesses grow rapidly, employees often turn to the most expedient solution without checking with the IT team. For small and medium-sized organizations, this tends to be a common issue.

One thing you can do to ensure your employees are not compromising your cybersecurity—besides impressing on them the importance of following IT best practices—is to make that the IT team highly visible in your organization and responsive to requests. If your company outsources its IT functions, encourage employees to contact your IT consultants with any questions or concerns about new devices or software they’d like to use, or if the current network setup isn’t meeting their needs. This way, employees are less likely to become frustrated and try to solve problems on their own.

Regular employee surveys can provide insights into how well your current networking systems are functioning. If there is a high level of frustration in a particular area, it may require troubleshooting to find a more streamlined solution.

Here are some questions you might want to ask:

  • Has there been a time when our security systems have posed a barrier to doing your job?
  • How easy is it to collaborate with your colleagues on shared deliverables?
  • Are the current project management tools meeting your needs?

And finally, while it may be an unpopular stance, here at Enetics Networks, we tend to discourage  our clients from having “bring your own devices” policies. We manage the software licenses for nearly all of our clients, and own and operate the network infrastructure and systems they use. This ensures that everything is up to date, and we can utilize Microsoft’s operating system approval mechanisms to prevent the addition of unauthorized devices and programs. Although not a fail-safe approach, it does reduce a common vulnerability many organizations unwittingly face.

Scott Ecker is the founder and owner of Enetics Networks, a leading IT consulting firm that provides secure, best-in-class, enterprise-level network solutions to businesses of all sizes.

Follow Us

From the Archives: Talk it Out

From the Archives: Talk it Out

In 1967, Pacific Northwest Bell ran full-page ads in the back of Seattle magazine announcing a marvel of modern living: the “Trimline Wall Model” telephone. Some of the copy was breathless—“A phone so compact it fits your life!”—and the photography was a dream in avocado green and sun-washed gold. Part of the Trimline’s magic is…

A Shot in the Arm for Data Delivery

A Shot in the Arm for Data Delivery

Bellevue-based Edifecs streamlines healthcare information sharing, protecting patients and promoting a holistic approach to wellness.

Your healthcare data is about personal as it gets,  and Edifecs wants to offer you peace of mind while it’s in motion. With legal mandates such as HIPAA governing the handling of healthcare information, exchanging this data can be a complex process. Bellevue-based Edifecs focuses on healthcare data interoperability—the ability for multiple systems to share…

Seattle Podcast: Laura Hoffman: Microsoft AI for Good

Seattle Podcast: Laura Hoffman: Microsoft AI for Good

The Seattle Podcast talks to Laura Hoffman about Microsoft's AI innovations and how human-centered tech can create positive global impact.

The Seattle Podcast talks to Laura Hoffman about Microsoft's AI innovations and how human-centered tech can create positive global impact.

The Museum of Flight’s New Exhibit Explores Life in Orbit
Sponsored

The Museum of Flight’s New Exhibit Explores Life in Orbit

The Museum of Flight’s New Exhibit Highlights the Wonder of Living in Space

The Museum of Flight’s immersive new exhibition, Home Beyond Earth, goes to the heart of living in a place somewhere between Earth and Moon. With a focus on space stations past, present and future, Home Beyond Earth visualizes our orbital dreams and accomplishments with large digital projections and more than 50 artifacts, models, space-flown objects and uniforms. To…