Your Employees Are Building a Second Network — And You Can't See It
In March 2021, a vulnerability in Microsoft Exchange Server sent security teams scrambling. But here's what didn't make the headlines: many organizations discovered Exchange instances they didn't even know existed. Rogue servers, spun up by departments who got tired of waiting for IT approval, sat unpatched for weeks because nobody in security knew to patch them.
That's shadow IT in action. And the shadow IT risks your organization faces right now are almost certainly worse than you think.
Shadow IT refers to any hardware, software, or cloud service used within your organization without explicit approval or oversight from your IT department. We're not talking about malicious insiders. We're talking about the marketing manager who signed up for a project management tool with her corporate email. The sales rep syncing contacts to a personal Dropbox. The developer running a test environment on an unapproved cloud instance.
According to the IBM Cost of a Data Breach Report 2021, the average cost of a data breach hit $4.24 million this year — the highest in 17 years. A significant driver? Complexity caused by technology sprawl and cloud migration. Shadow IT is the engine behind that sprawl.
Why Shadow IT Is Exploding in 2021
The pandemic-driven shift to remote work poured gasoline on shadow IT. When employees moved home in 2020, they needed tools fast. IT departments were overwhelmed. Employees did what resourceful people do — they found their own solutions.
Gartner estimated that shadow IT accounts for 30 to 40 percent of IT spending in large enterprises. I've seen organizations where that number is conservative. One mid-sized financial services firm I consulted with discovered over 200 unsanctioned SaaS applications in use across the company. Two hundred. Their IT team knew about roughly 40 approved tools.
Every single one of those unsanctioned apps represents an unmonitored attack surface. No patching schedule. No access controls. No logging. No incident response plan. Just credentials floating in the wind.
The Remote Work Accelerant
Remote work didn't just increase shadow IT — it made it invisible. When everyone's in the office, a network scan can surface unauthorized devices. When everyone's at home on personal Wi-Fi, your visibility drops to near zero.
Employees use personal devices to access shadow applications. Those personal devices often lack endpoint protection, up-to-date patches, and any form of monitoring. A single compromised personal laptop becomes a bridge straight into your corporate data.
The 5 Shadow IT Risks That Keep CISOs Up at Night
1. Data Breach Through Unmonitored Channels
When employees move sensitive data into unsanctioned applications, you lose control of that data. You can't encrypt what you don't know about. You can't monitor access to a platform you've never heard of. The 2021 Verizon Data Breach Investigations Report found that 85% of breaches involved a human element. Shadow IT multiplies that human risk by removing every guardrail your security team has built.
I've seen a healthcare organization face a HIPAA investigation because a physician's assistant was sharing patient notes through an unauthorized messaging app. The data was never encrypted in transit. The app provider had no BAA in place. The organization didn't even know it was happening until a patient complained.
2. Credential Theft and Account Takeover
Every shadow IT application is another place where employees reuse passwords. And they do reuse them — studies consistently show that over 60% of people use the same password across multiple accounts. A threat actor who compromises a low-security shadow SaaS tool can harvest credentials that unlock corporate email, VPN access, or cloud storage.
This is where phishing meets shadow IT in a devastating combination. A phishing simulation might train employees to spot fake Microsoft login pages, but what about the login page for that obscure project management tool only the design team uses? Threat actors love targeting the apps your security team doesn't monitor.
3. Compliance and Regulatory Violations
If your organization is subject to GDPR, HIPAA, PCI DSS, SOX, or any other regulatory framework, shadow IT can put you in violation overnight. You cannot demonstrate compliance with data handling requirements when data is flowing through tools you don't control.
The FTC has taken action against companies for failing to maintain reasonable security practices — and allowing uncontrolled data flows through unsanctioned applications is exactly the kind of failure regulators look for. An FTC consent order isn't just embarrassing. It comes with 20 years of mandatory auditing.
4. Ransomware Entry Points
Ransomware gangs don't need to breach your hardened perimeter when an employee's shadow cloud storage account gives them a side door. In 2021, ransomware attacks surged dramatically. The FBI's Internet Crime Complaint Center reported a 62% increase in ransomware incidents in the first half of this year alone, according to their IC3 reporting data.
Unsanctioned file-sharing services, remote access tools, and collaboration platforms — each one is a potential ransomware delivery mechanism that bypasses your email security gateway, your web proxy, and your endpoint detection.
5. Loss of Institutional Knowledge and Control
When a department builds critical workflows on a shadow IT platform and the employee who set it up leaves, you're left with a black box. No documentation. No admin credentials. No migration plan. I've watched organizations lose access to years of project data because it lived inside a tool that only one person managed — and that person moved on.
What Does Shadow IT Actually Look Like?
If you're picturing a rogue employee deliberately undermining security, reset that image. Shadow IT is almost always well-intentioned. Here's what it looks like in practice:
- A sales team signs up for a CRM tool because the approved one is slow and clunky.
- A developer spins up an AWS instance on a personal account to test code faster.
- A manager creates a shared Google Drive to collaborate with an external vendor.
- An HR coordinator uses an online form builder to collect employee health screenings.
- A finance analyst installs an unapproved browser extension that auto-fills data from spreadsheets.
None of these people are trying to cause a data breach. Every single one of them is creating one.
How to Discover Shadow IT in Your Organization
You can't fix what you can't see. Discovery is step one, and it requires a combination of technical controls and cultural change.
Technical Discovery
Cloud Access Security Brokers (CASBs) are the most effective tool for identifying shadow cloud usage. A CASB sits between your users and cloud services, giving you visibility into which applications employees access. If you're not running one yet, this should be your first investment.
Network traffic analysis can reveal connections to unknown SaaS platforms. DNS logs are surprisingly useful — if you see hundreds of DNS queries to a SaaS domain you've never approved, you've found shadow IT.
Endpoint monitoring tools can inventory installed applications across managed devices. The gap, of course, is unmanaged personal devices — which brings us back to the remote work problem.
Cultural Discovery
Here's something technical tools won't give you: context. You need employees to tell you what they're using and why. That only happens if you build a culture where disclosure isn't punished.
I recommend running a quarterly "tool census" — a simple, anonymous survey asking teams what applications they use daily. Frame it as a way to improve their experience, not catch them breaking rules. You'll be surprised what surfaces.
Reducing Shadow IT Risks with a Zero Trust Approach
A zero trust architecture is one of the most effective frameworks for containing shadow IT risks. The core principle — never trust, always verify — applies perfectly to unsanctioned applications.
With zero trust, every access request is authenticated and authorized regardless of source. Even if an employee is using a shadow application, zero trust policies can prevent that application from accessing sensitive corporate resources. Identity-aware proxies, micro-segmentation, and conditional access policies all reduce the blast radius of shadow IT.
Multi-factor authentication is non-negotiable. Enforce MFA on every corporate identity. If an employee reuses their corporate password on a shadow SaaS tool and that tool gets breached, MFA is the last line of defense preventing account takeover.
NIST's Zero Trust Architecture (SP 800-207) publication provides a solid framework for organizations beginning this journey.
Training Is the Multiplier Your Security Stack Needs
Technical controls catch shadow IT after the fact. Security awareness training prevents it from happening. When employees understand why shadow IT is dangerous — not just that it's against policy — their behavior changes.
I've seen organizations cut shadow IT incidents by over 40% within six months of implementing consistent security awareness training. The key is making it relevant. Don't lecture employees about abstract threats. Show them how a single unsanctioned file-sharing app led to a real breach. Show them how credential theft works when passwords are reused across shadow applications.
Our cybersecurity awareness training program covers shadow IT, social engineering, credential theft, and the practical decisions employees face every day. It's built for organizations that want measurable behavior change, not checkbox compliance.
Phishing Simulations Expose the Shadow IT Connection
Phishing simulations reveal more than click rates. They show you which employees are most susceptible to social engineering — and those employees are statistically more likely to adopt unsanctioned tools without questioning the security implications.
A well-designed phishing simulation program creates teachable moments. When an employee clicks a simulated phishing link, the immediate training that follows is far more impactful than any annual slide deck. Our phishing awareness training for organizations integrates simulation with education, connecting the dots between phishing, credential theft, and the broader risks of unsanctioned technology use.
What Is Shadow IT and Why Is It Dangerous?
Shadow IT is any technology — software, hardware, or cloud service — used within an organization without the knowledge or approval of the IT department. It is dangerous because it creates unmonitored attack surfaces, bypasses security controls, increases the risk of data breaches, enables credential theft through password reuse, and can cause regulatory compliance violations. In 2021, with remote work expanding the attack surface, shadow IT has become one of the most significant and underestimated threats to organizational security.
Building a Shadow IT Policy That Actually Works
A shadow IT policy that just says "don't do it" will fail. Employees use shadow IT because approved tools don't meet their needs. If your policy doesn't address that root cause, you're fighting human nature with a PDF nobody reads.
Make Approval Fast
If it takes six weeks to get a new tool approved, employees will go around you. Build a rapid evaluation process — a lightweight security review that can approve or deny a tool request within five business days. Publish a catalog of pre-approved alternatives for common needs: file sharing, project management, communication, form building.
Categorize Risk, Don't Just Block
Not all shadow IT carries the same risk. A design team using an unapproved color palette tool is different from a finance team storing spreadsheets in an unsanctioned cloud drive. Build a risk tiering system. Low-risk tools get a fast track. High-risk tools get a full security assessment. This keeps the process proportional and credible.
Enforce Consequences — But Start with Amnesty
Launch your shadow IT program with an amnesty period. Give employees 30 days to disclose unsanctioned tools without penalty. After that period, enforcement begins. This approach surfaces the tools you need to know about while establishing clear expectations going forward.
The Bottom Line on Shadow IT Risks
Shadow IT risks aren't theoretical. They're active in your network right now. Every unsanctioned application is a door your security team didn't install, can't lock, and doesn't monitor.
The fix requires three things working together: technical visibility through CASBs and network monitoring, a zero trust architecture that limits blast radius, and continuous security awareness training that changes employee behavior at the point of decision.
You already have employees using tools you don't know about. The question is whether you'll find those tools before a threat actor does.