{"id":15929,"date":"2023-09-26T14:31:00","date_gmt":"2023-09-26T14:31:00","guid":{"rendered":"https:\/\/www.walkme.com\/blog\/?p=15929"},"modified":"2023-09-26T14:31:00","modified_gmt":"2023-09-26T14:31:00","slug":"shadow-it","status":"publish","type":"post","link":"https:\/\/www.walkme.com\/blog\/shadow-it\/","title":{"rendered":"Shadow IT: What it is and how to remain safe"},"content":{"rendered":"\n<p>What\u2019s that lurking in the shadows?<\/p>\n\n\n\n<p>Staff using unapproved apps without consulting IT?<\/p>\n\n\n\n<p><a href=\"https:\/\/www.walkme.com\/glossary\/shadow-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Shadow IT<\/a> happens much more than many leaders know, but is it that bad? Surely, rules exist for us to break them, and there must be <a href=\"https:\/\/change.walkme.com\/a-comprehensive-guide-to-digital-change-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">digital change management<\/a> benefits to thinking outside the box when choosing apps to use at work, right?<\/p>\n\n\n\n<p>Well, yes and no.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img height=\"517\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/42_-of-team-members-use-email-accounts-not-approved-by-IT-departments-and-58_-of-managers-use-unapproved-tools-providing-features-approved-apps-do-not-offer_31650045.jpg?w=1024&#038;h=517&#038;crop=1\" alt=\"42_ of team members use email accounts not approved by IT departments, and 58_ of managers use unapproved tools, providing features approved apps do not offer.\" class=\"wp-image-15934\" width=\"1024\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/42_-of-team-members-use-email-accounts-not-approved-by-IT-departments-and-58_-of-managers-use-unapproved-tools-providing-features-approved-apps-do-not-offer_31650045.jpg 1200w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/42_-of-team-members-use-email-accounts-not-approved-by-IT-departments-and-58_-of-managers-use-unapproved-tools-providing-features-approved-apps-do-not-offer_31650045.jpg?resize=300,152 300w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/42_-of-team-members-use-email-accounts-not-approved-by-IT-departments-and-58_-of-managers-use-unapproved-tools-providing-features-approved-apps-do-not-offer_31650045.jpg?resize=1024,517 1024w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/quandarycg.com\/shadow-IT-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">42% of team members use email accounts not approved by IT departments<\/a>, and 58% of managers use unapproved tools, providing features approved apps do not offer.\u00a0<\/p>\n\n\n\n<p>Yet, one-third of all data breaches result from shadow IT tools (cited above), and <a href=\"https:\/\/change.walkme.com\/change-leadership\/\" target=\"_blank\" rel=\"noreferrer noopener\">change leadership<\/a> is not always aware.<\/p>\n\n\n\n<p>To help you understand what shadow IT is, how to identify shadow IT, and how to remain safe while using it, we will explore the following topics:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>What is shadow IT?<\/li><li>Why is shadow IT important?<\/li><li>What is a shadow IT application, and what types are there?<\/li><li>What does shadow IT look like in 2023?<\/li><li>Is shadow IT a threat?<\/li><li>Is shadow IT a good thing?<\/li><li>What is an example of shadow IT in business?<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is shadow IT?<\/strong><\/h2>\n\n\n\n<p>Shadow IT is <strong>utilizing IT systems, devices, software, apps, and cloud services without official approval from the IT department<\/strong>. Its prevalence surged due to embracing cloud-based apps and services.<\/p>\n\n\n\n<p>Although shadow IT has the potential to boost employee productivity and foster innovation, it can also pose significant security threats to your organization, including data breaches, possible breaches of compliance, and other concerns.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why is shadow IT important?<\/strong><\/h2>\n\n\n\n<p>Shadow IT becomes an option for employees when the required solutions are unavailable, or they aim to bypass established business limitations.&nbsp;<\/p>\n\n\n\n<p>In numerous enterprises, staff see the IT team as a hindrance rather than an ally. Alternatively, stringent corporate regulations hinder meaningful progress.<\/p>\n\n\n\n<p>Welcoming Shadow IT enables you to equip employees with the necessary tools for their daily responsibilities. Consequently, they devote less time to seeking alternatives and more time to achieving tasks.<\/p>\n\n\n\n<p>However, there are risks associated with shadow IT, which makes it an essential part of your IT strategy to consider using it or not.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is a shadow IT application, and what types are there?<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img height=\"498\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/shadow-IT-application_6500440b.jpg?w=1024&#038;h=498&#038;crop=1\" alt=\"shadow IT application\" class=\"wp-image-15931\" width=\"1024\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/shadow-IT-application_6500440b.jpg 1200w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/shadow-IT-application_6500440b.jpg?resize=300,146 300w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/shadow-IT-application_6500440b.jpg?resize=1024,498 1024w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/shadow-IT-application_6500440b.jpg?resize=740,360 740w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Any application a department or end user adopts for business without IT group involvement is shadow IT. These apps fit into three main types:<\/p>\n\n\n\n<p>1. <strong>Cloud-based apps<\/strong> accessed directly from the corporate network.<\/p>\n\n\n\n<p>2. <strong>Cloud-based connected apps<\/strong> accessed via an OAuth token (using credentials from a core SaaS app like Microsoft Office 365 or Google\u2019s G Suite).<\/p>\n\n\n\n<p>3. <strong>Packaged software<\/strong> purchased by a department or end-user and installed on the system. This kind is less common due to the rise of SaaS solutions.<\/p>\n\n\n\n<p>4. <a href=\"https:\/\/www.walkme.com\/blog\/shadow-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Shadow AI<\/strong><\/a> includes <a href=\"https:\/\/www.walkme.com\/glossary\/generative-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">generative AI<\/a> tools like ChatGPT that staff use on mobile devices or desktop to automate tasks without IT approval.\u00a0<\/p>\n\n\n\n<p>Be aware of what shadow IT applications look like to help you identify and manage them.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>6 steps to identify and manage shadow IT<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img height=\"606\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/6-steps-to-identify-and-manage-shadow-IT_95650046.jpg?w=1024&#038;h=606&#038;crop=1\" alt=\"6 steps to identify and manage shadow IT\" class=\"wp-image-15935\" width=\"1024\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/6-steps-to-identify-and-manage-shadow-IT_95650046.jpg 1200w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/6-steps-to-identify-and-manage-shadow-IT_95650046.jpg?resize=300,178 300w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/6-steps-to-identify-and-manage-shadow-IT_95650046.jpg?resize=1024,606 1024w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/6-steps-to-identify-and-manage-shadow-IT_95650046.jpg?resize=245,145 245w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Embracing a cloud-first approach increases encounters with shadow IT. However, you can address challenges and costs effectively. Proper shadow IT management is crucial to harness advantages while mitigating risks.<\/p>\n\n\n\n<p>Below is a shadow IT governance process for discovering, managing, and auditing unknown applications used by employees:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Automate Discovery for Visibility<\/strong><\/h3>\n\n\n\n<p>Discover all software in your portfolio through automated SaaS management, <a href=\"https:\/\/www.walkme.com\/blog\/application-portfolio-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Application Portfolio Management<\/a> (APM) platforms, or surveys.\u00a0<\/p>\n\n\n\n<p>Manual methods are inadequate for larger organizations\u2014store app details like owner, licenses, and spending to enhance accountability.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Schedule Risk Assessments<\/strong><\/h3>\n\n\n\n<p>Assess compliance, security certifications, and corporate data storage of apps. Evaluate regulatory and business risks. Prioritize actions based on security breaches, certifications, and future value.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Analyze Application Usage<\/strong><\/h3>\n\n\n\n<p>Track usage patterns via integrations and APIs. Identify underutilized apps. Begin with high-cost services, measure utilization, and categorize and compare usage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Evaluate and Rationalize Apps<\/strong><\/h3>\n\n\n\n<p>Rationalize apps based on need, user, and duration. Optimize or retire unused software. Categorize apps by importance, consider renewal dates, and sunset duplicative tools.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Implement Buying and Renewal Processes<\/strong><\/h3>\n\n\n\n<p>Develop a process for buying apps with business cases. Extend renewals, establish a renewal calendar, and communicate strategies to employees.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>6. Continuously Monitor and Review<\/strong><\/h3>\n\n\n\n<p>Automate monitoring to ensure rationalization and compliance. Regular reviews prevent data exposure, ensure policy compliance, and manage software costs.<\/p>\n\n\n\n<p>This six-step process empowers organizations to navigate the challenges of shadow IT while reaping its benefits. However, it is limited as organizations cannot monitor specific devices such as employee\u2019s personal devices or their personal Dropbox account.&nbsp;<\/p>\n\n\n\n<p>Focus on what you can monitor, such as critical systems, and bear in mind that there are limitations to specific security measures.&nbsp;<\/p>\n\n\n\n<p>Solve specific measures with open dialogue and encouraging best practices linking back to employees choosing to self-monitor and avoiding shadow IT where possible.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Is shadow IT a threat?<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img height=\"657\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Is-shadow-IT-a-threat__02650044.jpg?w=1024&#038;h=657&#038;crop=1\" alt=\"Is shadow IT a threat_\" class=\"wp-image-15932\" width=\"1024\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Is-shadow-IT-a-threat__02650044.jpg 1200w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Is-shadow-IT-a-threat__02650044.jpg?resize=300,193 300w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Is-shadow-IT-a-threat__02650044.jpg?resize=1024,657 1024w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Is-shadow-IT-a-threat__02650044.jpg?resize=80,50 80w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>IT and security units must gain visibility into the employed applications and their associated hazards.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Security Concerns<\/strong><\/h3>\n\n\n\n<p>Over half of organizations overlook shadow IT in their threat assessments, introducing security gaps. While some apps are benign, others may facilitate security risks like data leaks. Hence, IT should be informed about apps used for file sharing and more.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Non-Compliance Risk<\/strong><\/h3>\n\n\n\n<p>Organizations safeguard clients, customers, and partners to adhere to compliance regulations mandated by governments. Shadow IT-triggered non-compliance could lead to hefty fines if unauthorized software endangers sensitive data confidentiality.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Configuration Management Impact<\/strong><\/h3>\n\n\n\n<p>IT strives to establish seamless workflows via configuration management databases (CMDBs). Being off the radar, Shadow IT disrupts CMDB-backed systems due to its unrecognized existence.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Collaboration Inefficiencies<\/strong><\/h3>\n\n\n\n<p>Teams relying on disparate apps hinder <a href=\"https:\/\/change.walkme.com\/cross-functional-collaboration\/\" target=\"_blank\" rel=\"noreferrer noopener\">cross-functional collaboration<\/a>. For instance, if one team uses Google Drive and another uses Dropbox, file handling becomes convoluted.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Visibility Gap<\/strong><\/h3>\n\n\n\n<p>True to its name, shadow IT eludes IT departments. Though SaaS apps are compact, they can strain bandwidth or malfunction. Unrecognized broken apps impede quick fixes or solutions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Is shadow IT a good thing?<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img height=\"530\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Is-shadow-IT-a-good-thing__08650045.jpg?w=1024&#038;h=530&#038;crop=1\" alt=\"Is shadow IT a good thing_\" class=\"wp-image-15933\" width=\"1024\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Is-shadow-IT-a-good-thing__08650045.jpg 1200w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Is-shadow-IT-a-good-thing__08650045.jpg?resize=300,155 300w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Is-shadow-IT-a-good-thing__08650045.jpg?resize=1024,530 1024w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>There are four benefits of shadow IT for your business when you manage it effectively:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Empowers Employee Innovation<\/strong><\/h3>\n\n\n\n<p>Shadow IT arises when users seek alternatives due to delays in IT application development.&nbsp;<\/p>\n\n\n\n<p>IT can properly equip an <a href=\"https:\/\/change.walkme.com\/agile-workforce\/\" target=\"_blank\" rel=\"noreferrer noopener\">agile workforce<\/a> with tools to craft their solutions, giving them control over data and access without relying on IT requests.\u00a0<\/p>\n\n\n\n<p>This action fosters a shift towards employee-driven solutions and innovation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Aligned Solutions with Business Needs<\/strong><\/h3>\n\n\n\n<p>Traditional requests to IT often lead to miscommunication and misaligned solutions. Shadow IT eliminates this risk by allowing users to find or build solutions that closely match their objectives.&nbsp;<\/p>\n\n\n\n<p>This approach emphasizes solution appropriateness, alignment, and delivery speed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Boosts Productivity and Removes Obstacles<\/strong><\/h3>\n\n\n\n<p>Shadow IT emerges as employees seek solutions when IT barriers or strict corporate policies hinder them.&nbsp;<\/p>\n\n\n\n<p>By embracing Shadow IT, employees gain tools for everyday tasks, reducing time spent on workarounds and increasing productivity. This initiative reflects employee efficiency and ownership.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Relieves IT Department Burden<\/strong><\/h3>\n\n\n\n<p>IT departments often face heavy workloads, managing technology and handling various tasks. Embracing Shadow IT means granting users access to approved solutions or tools for self-creation.&nbsp;<\/p>\n\n\n\n<p>Doing so eases the IT department&#8217;s load, enabling them to focus on mission-critical responsibilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What examples of shadow IT exist in business?<\/strong><\/h2>\n\n\n\n<p>Many SaaS applications acquired by individuals leading to shadow IT typically fall within three main categories: productivity, communication, and collaboration.&nbsp;<\/p>\n\n\n\n<p>With a continuous influx of new providers and applications offering diverse features, employees opt for apps that best match their needs and update software as they deem appropriate.&nbsp;<\/p>\n\n\n\n<p>The subsequent list offers examples of typical shadow IT applications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Productivity<\/strong><\/h3>\n\n\n\n<p>Frequently, these apps revolve around enhanced project management, such as Trello or Hive, enabling employees to assign tasks and monitor time and progress.&nbsp;<\/p>\n\n\n\n<p>Other productivity apps focus on social media management, like Hootsuite, or aiding employees in assessing written output quality, like Grammarly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Communication<\/strong><\/h3>\n\n\n\n<p>Communication tools have gained paramount significance due to the rise in remote work opportunities.&nbsp;<\/p>\n\n\n\n<p>SaaS applications like Slack facilitate seamless communication, while video conferencing apps like Zoom or Webex assist remote teams in conducting video conferences and facilitating screen sharing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Collaboration<\/strong><\/h3>\n\n\n\n<p>Given the limitations of emailing large attachments, most teams resort to different file-sharing tools like Dropbox or OneDrive for file uploads and sharing.&nbsp;<\/p>\n\n\n\n<p>Naturally, many SaaS tools exist for collaborative work within project management. Prime examples include business leaders using Google Docs or apps to streamline workflows, incorporate discussion boards, and offer real-time notifications.<\/p>\n\n\n\n<p>In terms of hardware, typical shadow IT encompasses items such as servers, PCs, personal laptops, tablets, smartphones, and hard drives.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Minimize shadow IT risks with a DAP<\/strong><\/h2>\n\n\n\n<p>In the ever-evolving landscape of IT, transparent communication remains a pivotal strategy to mitigate shadow IT risks effectively.&nbsp;<\/p>\n\n\n\n<p>Organizations must recognize the potential of shadow IT to empower innovation while acknowledging its inherent security and compliance vulnerabilities. The best way to do this is by using the <a href=\"https:\/\/www.walkme.com\/glossary\/in-app-guidance\/\" target=\"_blank\" rel=\"noreferrer noopener\">in-app guidance<\/a> and personalized training capabilities of a <a href=\"https:\/\/www.walkme.com\/glossary\/dap\/\" target=\"_blank\" rel=\"noreferrer noopener\">DAP<\/a>.<\/p>\n\n\n\n<p>By using a DAP for proactive dialogue, informed decision-making, and collaborative problem-solving, enterprises can balance enabling innovation and safeguarding data integrity, thus steering clear of the pitfalls associated with shadow IT.<\/p>\n","protected":false},"excerpt":{"rendered":"What\u2019s that lurking in the shadows? Staff using unapproved apps without consulting IT? Shadow IT happens much more than many<span class=\"moretag\">&#8230;<\/span>","protected":false},"author":251,"featured_media":15930,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"mobile_image_id":0,"tablet_image_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[483],"tags":[8022,8020,437,8014,8018,8016],"class_list":["post-15929","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cio-it","tag-agile-workforce","tag-change-leadership-2","tag-dap","tag-digital-change-management","tag-in-app-guidance-2","tag-shadow-it-2"],"acf":{"__coauthors":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Shadow IT: What it is and how to remain safe<\/title>\n<meta name=\"description\" content=\"What\u2019s that in the shadows? Learn what shadow IT is and how to remain safe using it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.walkme.com\/blog\/shadow-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shadow IT: What it is and how to remain safe\" \/>\n<meta property=\"og:description\" content=\"What\u2019s that in the shadows? Learn what shadow IT is and how to remain safe using it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.walkme.com\/blog\/shadow-it\/\" \/>\n<meta property=\"og:site_name\" content=\"WalkMe Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-26T14:31:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"583\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tristan Ovington\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tristan Ovington\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.walkme.com\/blog\/shadow-it\/\",\"url\":\"https:\/\/www.walkme.com\/blog\/shadow-it\/\",\"name\":\"Shadow IT: What it is and how to remain safe\",\"isPartOf\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/shadow-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/shadow-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg\",\"datePublished\":\"2023-09-26T14:31:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/026c5704ea57a4ea7a54cd0d5a735ddd\"},\"description\":\"What\u2019s that in the shadows? Learn what shadow IT is and how to remain safe using it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/shadow-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.walkme.com\/blog\/shadow-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.walkme.com\/blog\/shadow-it\/#primaryimage\",\"url\":\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg\",\"contentUrl\":\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg\",\"width\":1200,\"height\":583,\"caption\":\"Shadow IT_ What it is and how to remain safe\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.walkme.com\/blog\/shadow-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.walkme.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CIO &amp; IT\",\"item\":\"https:\/\/www.walkme.com\/blog\/category\/cio-it\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Shadow IT: What it is and how to remain safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.walkme.com\/blog\/#website\",\"url\":\"https:\/\/www.walkme.com\/blog\/\",\"name\":\"WalkMe Blog\",\"description\":\"Digital adoption &amp; Change Management Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.walkme.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/026c5704ea57a4ea7a54cd0d5a735ddd\",\"name\":\"Tristan Ovington\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86ef9d0bdb1533aa08225a00d4c33626e88b046c3d319f406f1999a6f4e7b595?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86ef9d0bdb1533aa08225a00d4c33626e88b046c3d319f406f1999a6f4e7b595?s=96&d=monsterid&r=g\",\"caption\":\"Tristan Ovington\"},\"description\":\"Tristan Ovington, an accomplished senior writer and journalist, typically contributes his expertise to the Enterprisers Project. Renowned for his valuable perspectives on digital adoption, digital transformation, change management, and Cloud applications.\",\"url\":\"https:\/\/www.walkme.com\/blog\/author\/tristanovington\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shadow IT: What it is and how to remain safe","description":"What\u2019s that in the shadows? Learn what shadow IT is and how to remain safe using it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.walkme.com\/blog\/shadow-it\/","og_locale":"en_US","og_type":"article","og_title":"Shadow IT: What it is and how to remain safe","og_description":"What\u2019s that in the shadows? Learn what shadow IT is and how to remain safe using it.","og_url":"https:\/\/www.walkme.com\/blog\/shadow-it\/","og_site_name":"WalkMe Blog","article_published_time":"2023-09-26T14:31:00+00:00","og_image":[{"width":1200,"height":583,"url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg","type":"image\/jpeg"}],"author":"Tristan Ovington","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tristan Ovington","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.walkme.com\/blog\/shadow-it\/","url":"https:\/\/www.walkme.com\/blog\/shadow-it\/","name":"Shadow IT: What it is and how to remain safe","isPartOf":{"@id":"https:\/\/www.walkme.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.walkme.com\/blog\/shadow-it\/#primaryimage"},"image":{"@id":"https:\/\/www.walkme.com\/blog\/shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg","datePublished":"2023-09-26T14:31:00+00:00","author":{"@id":"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/026c5704ea57a4ea7a54cd0d5a735ddd"},"description":"What\u2019s that in the shadows? Learn what shadow IT is and how to remain safe using it.","breadcrumb":{"@id":"https:\/\/www.walkme.com\/blog\/shadow-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.walkme.com\/blog\/shadow-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.walkme.com\/blog\/shadow-it\/#primaryimage","url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg","contentUrl":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg","width":1200,"height":583,"caption":"Shadow IT_ What it is and how to remain safe"},{"@type":"BreadcrumbList","@id":"https:\/\/www.walkme.com\/blog\/shadow-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.walkme.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CIO &amp; IT","item":"https:\/\/www.walkme.com\/blog\/category\/cio-it\/"},{"@type":"ListItem","position":3,"name":"Shadow IT: What it is and how to remain safe"}]},{"@type":"WebSite","@id":"https:\/\/www.walkme.com\/blog\/#website","url":"https:\/\/www.walkme.com\/blog\/","name":"WalkMe Blog","description":"Digital adoption &amp; Change Management Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.walkme.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/026c5704ea57a4ea7a54cd0d5a735ddd","name":"Tristan Ovington","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86ef9d0bdb1533aa08225a00d4c33626e88b046c3d319f406f1999a6f4e7b595?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86ef9d0bdb1533aa08225a00d4c33626e88b046c3d319f406f1999a6f4e7b595?s=96&d=monsterid&r=g","caption":"Tristan Ovington"},"description":"Tristan Ovington, an accomplished senior writer and journalist, typically contributes his expertise to the Enterprisers Project. Renowned for his valuable perspectives on digital adoption, digital transformation, change management, and Cloud applications.","url":"https:\/\/www.walkme.com\/blog\/author\/tristanovington\/"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/walkme.com\/blog\/shadow-it\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Shadow IT: What it is and how to remain safe","url":"http:\/\/www.walkme.com\/blog\/shadow-it\/","mainEntityOfPage":{"@type":"WebPage","@id":"http:\/\/www.walkme.com\/blog\/shadow-it\/"},"thumbnailUrl":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg","image":{"@type":"ImageObject","url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg"},"articleSection":"CIO &amp; IT","author":[{"@type":"Person","name":"Tristan Ovington"}],"creator":["Tristan Ovington"],"publisher":{"@type":"Organization","name":"WalkMe Blog","logo":""},"keywords":["agile workforce","change leadership","dap","digital change management","in-app guidance","shadow it"],"dateCreated":"2023-09-26T14:31:00Z","datePublished":"2023-09-26T14:31:00Z","dateModified":"2023-09-26T14:31:00Z"},"rendered":"<script type=\"application\/ld+json\" class=\"wp-parsely-metadata\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"NewsArticle\",\"headline\":\"Shadow IT: What it is and how to remain safe\",\"url\":\"http:\\\/\\\/www.walkme.com\\\/blog\\\/shadow-it\\\/\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/www.walkme.com\\\/blog\\\/shadow-it\\\/\"},\"thumbnailUrl\":\"https:\\\/\\\/www.walkme.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/09\\\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.walkme.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/09\\\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg\"},\"articleSection\":\"CIO &amp; IT\",\"author\":[{\"@type\":\"Person\",\"name\":\"Tristan Ovington\"}],\"creator\":[\"Tristan Ovington\"],\"publisher\":{\"@type\":\"Organization\",\"name\":\"WalkMe Blog\",\"logo\":\"\"},\"keywords\":[\"agile workforce\",\"change leadership\",\"dap\",\"digital change management\",\"in-app guidance\",\"shadow it\"],\"dateCreated\":\"2023-09-26T14:31:00Z\",\"datePublished\":\"2023-09-26T14:31:00Z\",\"dateModified\":\"2023-09-26T14:31:00Z\"}<\/script>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/walkme.com\/p.js"},"lang":"en","translations":{"en":15929},"jetpack_featured_media_url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg","featured_image_src":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg","featured_image_src_square":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/Shadow-IT_-What-it-is-and-how-to-remain-safe_51650043.jpg","author_info":{"display_name":"Tristan Ovington","author_link":"https:\/\/www.walkme.com\/blog\/author\/tristanovington\/"},"jetpack_sharing_enabled":true,"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/posts\/15929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/users\/251"}],"replies":[{"embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/comments?post=15929"}],"version-history":[{"count":0,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/posts\/15929\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/media\/15930"}],"wp:attachment":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/media?parent=15929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/categories?post=15929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/tags?post=15929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}