Back to Blog

How to Manage Shadow IT in Your Organisation

How to Manage Shadow IT in Your Organisation

Shadow IT — the use of technology systems, software, devices, and services without the explicit knowledge or approval of your IT department — has become one of the most significant governance challenges facing UK organisations of every size. From a marketing manager signing up for a project management tool using a personal credit card, to a finance team sharing spreadsheets via a consumer cloud storage account, shadow IT is pervasive, growing, and far more dangerous than most business leaders realise.

The challenge is that shadow IT rarely stems from malicious intent. In almost every case, employees turn to unauthorised tools because they believe the approved systems are inadequate, too slow to provision, or simply not available. They are trying to do their jobs more effectively. But in doing so, they inadvertently create security vulnerabilities, compliance risks, data silos, and hidden costs that can be extremely difficult to unravel once entrenched.

This guide examines the scale of the shadow IT problem in UK organisations, the specific risks it creates, and practical strategies for managing it without stifling the innovation and agility that drives business growth.

80%
of UK employees admit to using at least one unapproved application at work
3-4x
The typical number of cloud apps in use vs what IT departments believe
£1.7M
Average annual shadow IT spend in mid-sized UK organisations
39%
of UK data breaches involve data stored in unapproved cloud services

What Counts as Shadow IT?

Shadow IT encompasses any technology used within your organisation that has not been formally approved, procured, and secured by your IT function. The scope is broader than most leaders expect. It includes SaaS applications such as Trello, Notion, Slack, Dropbox, or Monday.com that individual teams or departments have adopted independently. It includes personal devices used for work purposes without mobile device management controls. It includes consumer cloud storage services like Google Drive personal accounts or iCloud used to store or share business documents. It includes browser extensions and plugins installed without approval. It includes AI tools like ChatGPT used with company data without governance policies. And it includes spreadsheets and databases created outside of approved systems, often containing sensitive data with no backup or access controls.

The common thread is that IT has no visibility into these systems, no ability to secure them, no way to ensure they comply with your data protection obligations, and no mechanism to recover data from them if an employee leaves the organisation.

The AI Shadow IT Explosion

The rapid adoption of generative AI tools has created an entirely new category of shadow IT risk. Employees across UK organisations are using ChatGPT, Google Gemini, Microsoft Copilot (personal accounts), and other AI services with company data — including customer information, financial data, strategic plans, and proprietary content. Without formal AI usage policies and approved enterprise AI tools, sensitive business data is being fed into systems with no contractual data protection guarantees, potentially violating UK GDPR and compromising commercial confidentiality.

The Real Risks of Shadow IT

The risks created by shadow IT are not theoretical. They are concrete, measurable, and in many cases have already caused significant harm to UK organisations.

Security Vulnerabilities

Unapproved applications have not been vetted for security. They may lack encryption, use weak authentication, store data in jurisdictions outside the UK without adequate protections, or have known vulnerabilities that your IT team cannot patch because they do not know the application exists. Shadow IT creates blind spots in your security posture that attackers can exploit. The NCSC has specifically highlighted shadow cloud services as a growing vector for data breaches affecting UK businesses.

GDPR and Regulatory Compliance

Under UK GDPR, your organisation is responsible for the security and proper handling of personal data regardless of where it is stored or which tools are used to process it. If an employee stores client data in an unapproved cloud service that suffers a breach, your organisation — not the individual — bears the regulatory liability. The ICO has issued fines to organisations where data breaches originated from systems that the organisation did not even know were in use. Ignorance is not a defence under data protection law.

Data Loss and Business Continuity

Data stored in shadow IT systems is typically not backed up, not included in your disaster recovery plans, and may be lost entirely if the employee who created it leaves the organisation. We have seen cases where critical business processes depended on spreadsheets stored in a personal Dropbox account, project histories were locked in a free Trello board tied to a former employee's email address, and client communications were conducted through personal WhatsApp accounts with no retention or archiving.

Risk Category Shadow IT Impact Potential Consequence
Data Security Unencrypted data in unapproved cloud services Data breach, ICO investigation, fines up to £17.5M
Compliance Personal data processed without DPIA or lawful basis Regulatory enforcement, reputational damage
Financial Duplicate licences, unused subscriptions, hidden costs £50,000 - £500,000+ annual waste in mid-sized firms
Operational Data silos preventing collaboration and reporting Poor decisions based on incomplete information
Business Continuity Critical data not included in backup or DR plans Permanent data loss if employee leaves or service fails
Legal Business data subject to foreign jurisdiction laws Conflict with UK data sovereignty requirements

Discovering Shadow IT in Your Organisation

You cannot manage what you cannot see. The first step in addressing shadow IT is discovering its scope within your organisation. Several approaches can be used in combination to build a comprehensive picture.

Network Traffic Analysis

Your firewall and web proxy logs contain a wealth of information about which cloud services your employees are accessing. Cloud Access Security Broker (CASB) tools can analyse this traffic automatically, categorising applications by type, risk level, and usage volume. This analysis typically reveals three to four times more cloud applications than IT departments expect to find.

Financial Audit

Review expense claims, corporate credit card statements, and departmental budgets for software subscriptions. Look for recurring charges to SaaS providers, app store purchases, and online service subscriptions that have not been routed through IT procurement. Finance teams are often the first to spot shadow IT spending patterns.

Employee Survey

Simply asking employees what tools they use — framed as a discovery exercise rather than a disciplinary investigation — can reveal significant shadow IT usage. Make it clear that the purpose is to understand needs and improve the approved toolset, not to punish people for using unapproved solutions. Employees who feel safe to be honest will give you the most accurate picture.

Project Management Tools
78%
File Sharing / Storage
85%
Communication Apps
71%
AI / Generative Tools
66%
Design / Creative Tools
52%

Strategies for Managing Shadow IT

The goal of shadow IT management is not to eliminate every unapproved tool — that approach is both impractical and counterproductive. Instead, the objective is to create a framework that provides employees with the tools they need, secures the data they handle, and gives IT the visibility required to maintain governance and compliance.

1. Improve Your Approved Toolset

The single most effective way to reduce shadow IT is to ensure your approved tools genuinely meet employee needs. If people are using Trello because your approved project management tool is clunky and difficult, the answer is not to ban Trello — it is to provide a better approved alternative. Regularly gather feedback from departments about their technology needs and respond with timely procurement decisions.

2. Streamline IT Procurement

If it takes six weeks and three layers of approval to get a new software tool provisioned, employees will find their own solutions. Create a fast-track approval process for low-risk SaaS tools that can evaluate, approve, and provision new applications within days rather than months. A simple risk assessment framework — covering data handling, security, GDPR compliance, and cost — can be applied by the IT team or a virtual CIO to make rapid but informed decisions.

3. Implement a Cloud Access Security Broker

A CASB sits between your users and cloud services, providing visibility into which applications are being used, what data is being uploaded, and whether those applications meet your security and compliance requirements. CASBs can block high-risk applications, enforce data loss prevention policies, and provide detailed analytics about cloud usage across your organisation.

4. Create Clear and Reasonable Policies

Your acceptable use policy should explicitly address shadow IT, explaining what employees can and cannot do, why the restrictions exist, and how to request new tools. The policy should be practical and reasonable — blanket bans on everything breed resentment and drive shadow IT further underground. Instead, categorise tools by risk level: approved, conditionally approved (with specific controls), and prohibited (with clear explanations of why).

Effective Shadow IT Management

  • Regular discovery audits to maintain visibility
  • Fast-track approval for low-risk tools
  • CASB providing real-time cloud usage analytics
  • Clear policies with practical guidance
  • Employee education on risks and alternatives
  • Virtual CIO reviewing technology strategy quarterly
  • Approved toolset regularly updated based on feedback

Ineffective Shadow IT Response

  • No discovery — IT unaware of true scope
  • Lengthy procurement blocking legitimate needs
  • No visibility into cloud application usage
  • Vague policies that employees ignore
  • Punitive approach driving behaviour underground
  • No strategic technology leadership
  • Approved tools outdated and frustrating to use

The Role of the Virtual CIO in Shadow IT Governance

For organisations without a full-time Chief Information Officer, a virtual CIO service provides the strategic technology leadership needed to address shadow IT systematically. A virtual CIO brings an outside perspective, industry knowledge, and governance frameworks that transform shadow IT from an unmanaged risk into a managed aspect of your technology strategy.

The virtual CIO works with department heads to understand their technology needs, evaluates tools against security and compliance requirements, develops policies that balance governance with agility, and creates a technology roadmap that proactively addresses the gaps that drive shadow IT adoption. This strategic approach is far more effective than reactive whack-a-mole attempts to block individual applications.

Organisations with formal shadow IT policies28%
Organisations using CASB tools19%
Organisations that audit shadow IT annually34%
Organisations with fast-track app approval22%

Need Help Managing Shadow IT?

Cloudswitched provides virtual CIO and IT governance services that help UK organisations discover, assess, and manage shadow IT effectively. From cloud usage audits and CASB deployment to policy development and strategic technology planning, we bring order to the chaos without stifling your team's ability to innovate. Get in touch to arrange a shadow IT discovery assessment.

GET IN TOUCH
Tags:Shadow ITGovernanceVirtual CIO
CloudSwitched
CloudSwitched

Centrally located in London, Shoreditch, we offer a range of IT services and solutions to small/medium sized companies.