Shadow IT in Hybrid Work: A Cultural Problem, Not a Tech One

Combatting rogue tools through visibility, empathy, and user-led adoption

6
Shadow IT in Hybrid Work: A Cultural Problem, Not a Tech One
Unified CommunicationsInsights

Published: August 28, 2025

Rebekah Carter - Writer

Rebekah Carter

Shadow IT in hybrid work isn’t disappearing. Honestly, it’s getting worse. Most of the time, though, the issue isn’t that employees actively want to sabotage companies, opening back doors for hackers through unsanctioned tools. They’re just sick of being banned from the solutions they prefer.

Shadow IT isn’t about saboteurs. It’s about smart, capable people trying to do their jobs in ways that feel faster, simpler, or more familiar than the tools IT handed them. In hybrid setups, where policies are fuzzy, helpdesks are remote, and time is short, that instinct gets amplified.

According to one report, over 50 percent of the apps used in the enterprise are unsanctioned. It’s more than team members using WhatsApp instead of Slack, or Google Workspace instead of Microsoft Teams these days.

One Fortune 500 financial services firm revealed that over 60 percent of the sales team routinely fed client meeting recordings into unsanctioned AI tools. That’s a problem for consistency, cohesion, and compliance. The only way to fix it? Start making secure work the path of least resistance.

What Shadow IT in Hybrid Work Really Costs Enterprises

It’s tempting to think of shadow IT as a minor nuisance. A few duplicate tools, an app subscription here or there. But that’s the same logic that let Zoom spread like wildfire during the pandemic, right under the noses of IT teams who were still trying to get Skype working.

Shadow IT in hybrid work costs you money, time, security, compliance, and often your employees’ trust. The results?

Higher Costs, More Waste

Around 53 percent of the apps and tools companies pay for go unutilized, because employees just use the solutions they prefer instead. Sales teams stick to their own CRMs; project teams use a handful of different productivity apps, most with overlapping features.

This isn’t just “waste.” It’s fragmentation, disconnected workflows, and data living in places you can’t see or secure.

Security Gaps Multiply Fast

Most shadow tools bypass SSO. They live outside your endpoint protection, and they’re not built with enterprise-grade security. You’ve got users uploading sensitive files into tools that don’t meet your minimum compliance standards, often without realizing it. Many even end up using the same credentials across multiple platforms, increasing your attack surface.

Compliance Issues Add Up

If you work in government, law, or healthcare, you know how strict GDPR, HIPAA, and public sector procurement rules can be. Now, imagine a breach traced back to an app IT never approved. Regulators won’t care that it was “just a PDF tool” or “a productivity hack.” They’ll ask why your governance didn’t account for it.

AI Has Supercharged the Problem

A year ago, “Shadow IT” mostly meant rogue SaaS. Today, it includes AI tools that absorb sensitive context without offering any guardrails. According to one report, around half of all knowledge workers use personal AI tools (without telling their IT teams). Most say they wouldn’t stop either, even if the tool was banned.

Why Shadow IT in Hybrid Work Is a Cultural Problem

Shadow IT in hybrid work is rarely about rebellion. It’s about friction.

When people bypass IT tools, they’re not usually trying to break rules; they’re trying to bypass inefficiency. Tools feel clunky. Procurement takes months. Training is unclear. When your meeting starts in 90 seconds, Outlook’s broken, and you just need to share a file, you find a workaround.

Platforms like Slack, Notion, Trello, Grammarly, ChatGPT, and Google Forms? These aren’t evil tools. They’re frictionless. That’s the point. People go around IT because consumer-grade UX beats enterprise red tape every time.

Shadow IT is an indicator of where the business is failing to meet the needs of its people.

This is especially true in high-regulation, high-pressure sectors like healthcare, law, and government. When a clinician needs to update patient notes across three platforms, none of which talk to each other, they’re going to open Notepad or WhatsApp a colleague because the actual sanctioned route is exhausting.

What’s more, remote and hybrid models have diluted team accountability. There’s less peer oversight. Less “is this okay to use?” questioning. Everyone’s making do. Which is precisely how data leaks happen.

How to Regain Control of Shadow IT in Hybrid Work

Managing shadow IT isn’t as easy as just being more aggressive about punishing people who use unsanctioned tools or blocking access to certain apps. Most companies need to rebuild their tech stack with a user-centric approach. Here’s how to begin.

Discover the Shadow Stack

You can’t fix an issue you can’t see. Sending out anonymous user surveys asking teams to tell you what they’re using will only work so well. Fortunately, some tools can help shine a light on your tech stack.

Use tools like Zluri, Microsoft Defender for Cloud Apps, Palo Alto Networks or Reco’s SaaS Security platform. These engineered tools monitor real usage, browser metrics, identity events, network access, and uncover all shadow apps, including high-risk GenAI tools.

One company (Kaizen Gaming) used Zuri to find over 2,000 unmanaged applications distributed across the enterprise. You may be surprised at what you uncover.

Co-Create Policy with End Users

Policy works best when users feel ownership, like they’re getting a say in what they use. Host small focus groups with marketing, sales, clinical, or legal teams. Ask:

  • Which unsanctioned tools are helpful?
  • Why aren’t they adopting official alternatives?
  • Which tools are trustworthy?

Turn department champions into shadow‑tool‑reporting advocates. You’ll uncover what tools drive productivity and reshape policies to support the right tools rather than chase shadows.

Tier Risk with Context

Non-sensitive tools (like Trello or Slack integrations) can be whitelisted, even if unsanctioned, when combined with controls. Alternatively, high-risk AI or file-sharing tools should be blocked or restricted.

Modern shadow IT governance platforms let you:

  • Classify apps by risk
  • Grant “just-in-time” access
  • Automate revocation triggers (e.g., after a project ends)

Done right, users don’t feel their workflow is broken; they feel it’s subtly maintained.

Introduce Transparent Reporting & Guidance

Create a blameless culture around shadow IT. Instead of triggering disciplinary action, reward employees who report tools or submit rational use cases. Publish quarterly “most-requested tools by teams” reports.

Use internal newsletters or Slack channels to say, “Here’s something we found. We’re evaluating it. In the meantime, here’s an approved alternative.”

That transparency replaces fear with trust and reduces impulsive tool adoption.

Shadow AI Governance Is Non-Negotiable

GenAI tools are fast becoming the biggest shadow risk. Take control by:

  • Defining clear policies on prompt formatting, data uploads, and model retention.
  • Deploying GenAI monitoring tools like Reco or Knostic, which map identity‑centric AI usage and flag abnormal behavior.
  • Investing in vetted internal solutions like enterprise Copilot, Microsoft Syntex, or regulated AI tools for legal/financial workflows.

Once you’ve invested in AI tools, use governance solutions (like the new suite from Theta Lake) to monitor how people are using them.

Make IT a Service Broker, Not a Gatekeeper

Shift IT’s role from “no” to “here’s how.” Build a lightweight internal tech marketplace, maintained by IT but reviewed with department reps. Encourage trial through sandbox tiers or category tracks when new tools are requested.

Enabling safe exploration instead of blocking it makes employees feel respected, and compliance becomes a byproduct, not a barrier.

Emerging Trends in Tackling Shadow IT

As shadow IT in hybrid work grows more complex with AI tools, browser plugins, and “invisible” SaaS, leading enterprises are shifting their approach from reactive control to proactive enablement. It’s time to prepare for the growth of:

  • AI-Powered Discovery Tools: Modern discovery tools are going beyond static app inventories. Platforms like Reco, Zluri, and Productiv use AI to detect tools based on behavioral signals, flag risky usage patterns, and correlate access, spend, and risk across departments.
  • User-Led Governance: Rather than enforcing tools top-down, orgs are embedding tech request channels into collaboration tools, and allowing departments to justify new tool investments with ROI assessments. Some are even creating “SaaS steering groups” with reps from legal, IT, and line-of-business leaders.
  • Browser-Level Controls & Extensions: Newer platforms like Security and Talon are exploring browser-native security layers, designed to detect data leakage via browser copy/paste or download activity, and control extensions and browser apps.

Shining a Light on Shadow IT in Hybrid Work

Shadow IT in hybrid work isn’t a problem that’s just going to disappear. It’s a symptom of cultural friction, gaps in enablement, and the speed of modern work outpacing traditional governance.

Yes, the risks are significant. But so are the opportunities. You reduce risk by embracing user-led technology adoption, treating shadow IT as a cultural signal, and giving employees safe, approved alternatives. But you also boost productivity, trust, and agility.

This is about building an environment where secure work is the path that makes the most sense.

Digital GovernanceDigital TransformationHybrid WorkSecurity and Compliance

Brands mentioned in this article.

Featured

Share This Post