Microsolve Business IT Insights

Shadow IT - Causes, Signs & Examples

Written by Dale Jenkins | 11 April 2025 11:16:44 AM

Shadow IT traditionally refers to employees using technology solutions—like cloud apps, personal devices, or software—without formal approval from their organisation’s IT department. Think of it as employees "going rogue" with tools they believe know help them work faster or smarter. While on the surface this sounds harmless enough, it does, absolutely, 100% create risks that can spiral into security breaches, compliance headaches, and budget blowouts.

For Organisations that don't HAVE an internal IT department and rely on an outsourced service (be it an MSP, TSP or an "Outsourcer") this becomes even more complex as the outsourced service provider will often have a complete blind spot for Shadow IT and if there are contractual/trust issues at play, this only gets worse!

Imagine a Nurse in an aged care facility using a personal Google Drive account to share patient schedules because the approved system doesn't support an Android handset and they can't afford an iPhone; or a finance team subscribing to a project management tool to meet deadlines; or a marketing team establishing a new email broadcast tool with a DNS zone and temporary email address.  These are common examples of Shadow IT in action.

 

Why Does Shadow IT Happen?

  1. The Need for Speed! --In industries like healthcare and professional services, lengthy IT approval processes are an impediment to the push for immediate results. A 2025 study found that 58% of Australian workers use unauthorised tools because official channels are too slow. When a hospital admin needs to coordinate staff rosters urgently, waiting weeks for IT to approve a new app isn’t feasible!
  2. The Cloud Makes It Easy -- Cloud platforms like Dropbox or Trello require no technical expertise—just a credit card and an email. Teams can onboard tools in minutes, often without IT ever knowing. A PwC Australia report revealed that Enterprise organisations average 670 unsanctioned cloud services, with storage apps posing the highest compliance risks. SME's average around 55 unsanctioned cloud services and even micro-businesses are not immune with sole operators often having a half dozen or so "unused" subscriptions that could well be classified as "Shadow IT" services.
  3. Hybrid Work Fuels Fragmentation --Remote work has blurred the lines between personal and professional tech. Employees working from home might use personal laptops or unsecured Wi-Fi to access sensitive data, creating gaps in corporate security.

 

Spotting Shadow IT in Your Organisation

Unusual Network Activity

IT teams might notice spikes in data uploads to unknown IP addresses. For instance, a Melbourne-based accounting firm discovered employees were using a free invoicing app that leaked client data overseas. Regular reviews of firewall traffic logs will identify unusual destinations that may be "indicators of issues" that warrant investigation.

Mystery Software

Regularly review installed software lists across the device fleet to identify unauthorised additions - many Shadow IT candidates allow for installation of components without the need for an Administrator account.

Unusual Branding / Communications

Keep an eye out for Newsletters, company marketing or special event branding and communication channels as these may well be established "outside" of IT control as they are rarely seen as IT assets, but can open up significant security, compliance and brand issues.

Recurring Credit Card expense line items

Finance and accounting teams are often the Whistleblowers for Shadow IT as they will identify recurring transactions on company Credit Cards well before an IT audit will be completed.  Keeping an open channel between IT and Finance is a great way for this information to be identified early and actioned before Shadow IT becomes a major business risk point.

Departmental Data Islands

When teams argue that their tool is "best" for transferring data this is often a sign of tool duplication and at least one Shadow IT system (sometimes BOTH are using Shadow IT!).  Data Islands such as this are both productivity killers as well as security risks.

IT Support Ticket Confusion

When an experienced Help Desk/Support Centre analyst has a "what the" moment regarding a system they have never heard of and can't find in documentation for (but a quick google leads them to a sign-up page), then that is a pretty sure sign of a Shadow IT issue that needs addressing.  If you have an outsourced helpdesk/Support Centre, make sure they have a clear reporting channel for such issues.

 

Key Takeaways

Audit Regularly:  Use software inventory tools, firewall traffic categorisation and credit card reviews to identify risk areas

Talk to Teams: Check-in with the under-pressure teams on what IT impediments they face - look for areas where new tools are needed and engage with them on the "best" way to choose and include such tools in the Corporate application stack

Optimise Approvals: Ensure that there are defined, documented, resourced and publicised programs for the evaluation of new technology solutions to reduce the temptation for staff to "go Rogue"!