Almost a quarter (23%) of professionals surveyed in South Africa consider cybersecurity rules in their company to be excessive or not fully appropriate.

This is the headline finding from a Kaspersky survey in the Middle East, Turkiye and Africa (META) region entitled “Cybersecurity in the workplace: Employee knowledge and behaviour”.

While 10% noted that their organisations do not have cybersecurity rules or that they are not aware of them. These results show a disconnect between corporate cybersecurity policies and employee commitment to these rules, underscoring the risks associated with shadow IT and unmanaged device usage in the workplace.

Shadow IT is defined as the use of unauthorised software, devices, or services without IT oversight, and it has evolved into a critical business risk. While often driven by employee productivity needs, it creates blind spots for IT departments.

The rise of hybrid work environments, increased reliance on cloud-based tools and the spread of AI tools have accelerated this trend.

Without robust cybersecurity management and oversight, organisations face heightened exposure to ransomware attacks, data leaks, and regulatory penalties.

Twenty-four percent of survey respondents in South Africa said there are no policies regarding the use of non-corporate devices in their company.

Meanwhile, 25% of employees admitted that they can use their own devices to access business information, provided they have some type of cybersecurity protection, even consumer-grade software.

On the positive side, 18% said they can use their own device, but these must first pass more stringent corporate IT security checks; while 33% of respondents indicated that only devices provided by the IT function can be used for work purposes.

The situation is significantly better with permissions for employees to install software on corporate devices without IT department’s approval: 66% of respondents from South Africa reported that only IT specialists in their company are allowed to install software, while in 18% of organisations only top management or designated users can do so.

Nine percent of employees can install software that is approved by the IT team. However, 5% of respondents said that all users can install any software they need without IT agreement in their organisation.

At the same time 17% of local professionals surveyed acknowledged that within the past year they installed software on their work devices without IT supervision. That highlights a persistent shadow IT challenge that continues to expose organisations to security vulnerabilities, compliance risks, and data breaches.

“Shadow IT is now a mainstream operational risk,” says Toufic Derbass, MD: META region at Kaspersky. “When one in five employees installs software without IT oversight, it signals a policy gap.

“Many organisations already have security policies in place, but employee perception must also be considered.

“Organisations should move beyond restrictive controls and instead implement intelligent, user-centric cybersecurity strategies that combine strategies that integrate technology with employee awareness and responsible use.”