What is shadow IT and why is it a growing security threat?
80% of workers use unapproved apps at work. Learn what shadow IT is, why employees do it, and how to manage the risk without killing productivity.
Key Takeaways
- 80% of workers admit to using SaaS applications at work without IT approval
- 65% of all SaaS apps in organizations are unsanctioned, and 42% of all company applications result from shadow IT
- 50% of organizations have already suffered a security breach tied to shadow IT
- Shadow AI - employees using unapproved AI tools - is the fastest-growing shadow IT category in 2025
- The solution isn't banning tools but creating fast, easy approval processes and giving employees sanctioned alternatives
Your employees are using tools you don’t know about. Right now, someone on your team is uploading customer data to an app IT has never vetted, sharing company files through a personal cloud storage account, or pasting confidential information into an AI tool that has no data protection agreement with your business.
They’re not doing it to be malicious. They’re doing it because it makes their job easier and asking IT for approval takes too long.
This is shadow IT - and it’s one of the fastest-growing security risks in business today.
What Is Shadow IT?
Shadow IT refers to any hardware, software, cloud service, or technology used by employees for work purposes without the knowledge or approval of the IT department.
Common examples:
- Personal Dropbox or Google Drive accounts used for work files
- Messaging apps (WhatsApp, Signal, Telegram) used for business communication
- Unapproved project management tools (Trello, Notion, Monday.com)
- Personal email accounts used for work correspondence
- Browser extensions that access company data
- AI tools used without IT awareness (ChatGPT, Claude, Gemini, AI writing assistants)
- Personal devices connecting to company resources without MDM
The Numbers Paint a Concerning Picture
| Statistic | Data |
|---|---|
| Workers using unapproved apps | 80% |
| SaaS apps that are unsanctioned | 65% |
| Company applications resulting from shadow IT | 42% |
| Organizations that suffered shadow IT breaches | 50% |
| Employees who need to work around security policy | 35% |
| IT teams able to meet technology request demand | Only 12% |
That last number is critical. Only 12% of IT departments can meet the demand for new technology requests. The gap between what employees need and what IT can deliver is the root cause of shadow IT.
Why Employees Use Shadow IT
Understanding the “why” is essential to solving the problem. Employees turn to shadow IT because:
IT Is Too Slow
The average approval process for a new tool can take weeks or months. An employee who needs a project management tool today doesn’t want to wait until next quarter. So they sign up for a free trial and start using it immediately.
Approved Tools Don’t Meet Their Needs
If the company-approved tools are clunky, outdated, or missing features, employees find better alternatives on their own. People will always gravitate toward tools that help them work more efficiently.
They Don’t Know It’s a Problem
Many employees don’t realize that using a personal Dropbox account or a free AI tool for work poses any security risk. From their perspective, they’re just getting their job done.
Remote Work Changed Everything
When employees work from home, they have more autonomy over their technology choices and less visibility from IT. The shift to hybrid work accelerated shadow IT adoption dramatically.
The Security Risks Are Real
Data Exposure
When company data enters unsanctioned tools, you lose control over:
- Where the data is stored (what country? what security standards?)
- Who can access it (what are the provider’s access controls?)
- How long it’s retained (does the provider keep copies indefinitely?)
- Whether it’s used for other purposes (is your data training an AI model?)
Compliance Violations
53% of organizations have experienced compliance violations due to shadow IT. If customer data subject to HIPAA, PCI, or privacy regulations ends up in an unvetted tool, your business faces potential fines and legal liability - regardless of employee intent.
Account Compromise
Shadow IT accounts typically:
- Use weak or reused passwords
- Lack multi-factor authentication
- Aren’t monitored by security tools
- Won’t be disabled when the employee leaves
A compromised shadow IT account can expose company data without IT ever knowing it existed.
Breach Amplification
If an attacker compromises an employee’s work device, shadow IT multiplies the blast radius. Instead of accessing only IT-managed systems, the attacker also gains access to every personal tool the employee was logged into - tools that IT can’t detect, monitor, or secure.
The Rise of Shadow AI
Shadow IT has a new and rapidly growing cousin: Shadow AI.
Employees are using AI tools - ChatGPT, Claude, Gemini, AI writing assistants, AI image generators, AI code tools - for work purposes without IT knowledge or approval. This creates all the traditional shadow IT risks plus a new one: data that employees input into AI tools may be used for model training, potentially exposing confidential information to the AI provider and its future users.
AI-related SaaS spending increased 108% year over year in 2025, with much of this growth driven by individual employee adoption rather than organizational procurement.
By 2027, Gartner forecasts that 75% of employees will use technology outside of IT oversight - with AI tools driving much of that growth.
How to Manage Shadow IT (Without Banning Everything)
What Doesn’t Work: Blanket Bans
Banning unapproved tools doesn’t stop usage. It drives it underground onto personal devices and accounts where you have zero visibility. 35% of employees say they need to work around security policy to get their job done. If banning tools forces workarounds, you’ve made the problem less visible without making it less dangerous.
What Works: A Balanced Approach
1. Discover What’s Out There
You can’t manage what you can’t see:
- Review expense reports and credit card statements for SaaS charges
- Check SSO and browser logs for unauthorized applications
- Use a Cloud Access Security Broker (CASB) to identify shadow cloud usage
- Survey employees about what tools they actually use (create a safe, no-judgment process)
- Monitor DNS logs for connections to SaaS platforms
2. Create a Fast Approval Process
If approval takes weeks, employees will skip it. Build a streamlined process:
- Simple request form - not a 20-page procurement document
- 48-hour initial review for low-risk tools
- Clear criteria so employees know what will be approved
- IT champions in each department who can escalate common requests
- Pre-approved tool categories for low-risk use cases
3. Provide Good Sanctioned Alternatives
For every shadow IT category, ensure there’s an approved option that’s genuinely useful:
| Shadow IT Category | Sanctioned Alternative |
|---|---|
| Personal file sharing | Company OneDrive/SharePoint |
| Consumer AI tools | Enterprise AI with data protection |
| Personal messaging apps | Microsoft Teams, Slack (company-managed) |
| Unapproved project tools | Company-approved project management |
| Personal email for work | Proper forwarding and mobile access setup |
If the approved tools genuinely meet employee needs, shadow IT adoption drops significantly.
4. Educate, Don’t Punish
Most shadow IT is driven by good intentions. Education should focus on:
- Why shadow IT is risky (specific examples, not abstract threats)
- How to request new tools quickly
- What approved alternatives exist
- How to handle situations where no approved tool fits
5. Monitor Continuously
Shadow IT isn’t a one-time fix. New tools emerge constantly, and employees adopt them just as fast. Build ongoing monitoring into your security operations:
- Quarterly shadow IT discovery scans
- Regular expense report reviews for SaaS charges
- Employee surveys during security awareness training
- DNS and web traffic analysis
The Bottom Line
Shadow IT exists because employees need tools and IT can’t always keep up. The answer isn’t more restrictions - it’s smarter governance that balances security with productivity.
Discover what’s in use, provide approved alternatives that employees actually want, create fast approval processes for new requests, and educate your team about the risks. The goal is to bring shadow IT into the light, not pretend it doesn’t exist.
Concerned about shadow IT and shadow AI in your organization? Contact us for a technology assessment that identifies unsanctioned tools and recommends governance strategies.
Have More Questions?
Our team is here to help. Whether you're evaluating IT services or have a specific question about your technology, we're happy to have a conversation.