Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Restrict, ignore, embrace: The shadow IT trilemma

According to the latest CSA’s findings, 58% of IT managers are using unapproved tools to collaborate and communicate. Let that sink in — that’s not just a few rebels; more than half of the very people tasked with enforcing tech compliance are sidestepping the rules themselves.  

Why? Because rules that don’t align with real workflows get walked around.  

Even though you might think that the shadow IT topic is not relevant anymore, I’d like to challenge you on this: the systems have evolved, and so has shadow IT. A decade ago, it was Dropbox and Google Drive. Today, it’s unsanctioned AI agents, open-source frameworks or LLM-powered copilot tools that developers experiment with on their own. Yet, shadow IT is still very relevant; only the circumstances have changed. Tech evolves, but human nature craves convenience — so IT leaders must keep their eyes wide open to track tool usage and treat shadow IT as valuable feedback to build workflows everyone can use.  

Path of least resistance  

A close friend of mine worked in a manufacturing firm years ago. Over there, engineers used personal Google Drive accounts to share their 3D models since corporate servers were slow and approval processes took weeks, but no one had cancelled the deadlines. Their leadership discovered this shadowy practice during a workflow audit. Their reaction? A blanket ban on external cloud storage. Not really helping productivity or morale. Fast forward six months, and the engineers were using USB drives to share. USB drives!  

What leadership missed wasn’t just the security risk; it was an opportunity to listen and learn. Instead of punishing the workaround, they could have questioned the behaviour and could have aimed to identify why this path was chosen, since behind every unsanctioned IT tool is a process that is outdated, slow and broken.  

Employees view this as a path of least resistance to get their job done quicker, while organizations (and especially IT leadership) can view it as rebellion. But what it actually is, is nothing but feedback. Employees don’t bypass systems to cause harm; they do it because the “official” paths fail them.   

Why shadow IT persists  

There is no doubt that centralized IT systems offer efficiency and control. But when tools (or their admins) don’t align with user needs, frustrations bubble: 61% of employees aren’t satisfied with existing technologies, finding them to be buggy and unreliable. Poor IT support also plays a role: 38% of employees are driven towards shadow IT due to slow IT response times, leading to frustration and a desire for more efficient solutions.  

Leaders often fixate on the hypothetical, ignoring the tangible. Sure, blocking a tool like WhatsApp might prevent a theoretical data leak, but it also sacrifices agility and morale. Beezy’s study also showed that despite 85% of employees believing that their business monitors their activity, they still rely on unsanctioned tools, indicating that employees are willing to take risks to get work done more efficiently. Essentially, employees opted for riskier speed and ease over safer compliance.  

Think of yourself as a park landscaper. You are to create the sidewalks and zebra crossings, yet despite having carefully planned the structure, you suddenly start noticing freshly trodden paths. Here, you have three options:   

  1. You can either choose to penalize those who do not follow the rules   
  2. You can choose to ignore the trodden paths
  3. You can create additional crosswalks exactly there, where people have chosen to disregard the rules, since they prove to be the most comfortable and “user-tested.”

This trilemma is more commonplace than some might think. Now, let’s move this to the dilemma of what to do with the shadow IT, options being:   

  1. Restrict (the traditional approach). Block tools that were authorized, enforce company-wide policies and monitor compliance. For sure, short-term gains are nearly guaranteed, but so are long-term losses in trust and morale. In the end, the likelihood of different workarounds emerging is as high as Burj Khalifa. Imagine a dev company blocking access to Claude, citing potential code leaks. Developers might migrate to ChatGPT, Gemini or Copilot or even worse, start using their personal PCs. Again — paths of lesser resistance. Restrictions may make sense in government or military contexts, where the risk of a leak could have national consequences. But when a private company tries to apply those same restrictions, it becomes overkill. You lose agility for a hypothetical risk that might never even materialize.
  2. Ignore (the passive approach). Turn a blind eye: avoids conflict, compounds risk. Due to the prevalence of shadow IT solutions, ignoring them completely runs a high risk of company or customer data ending up where it shouldn’t. The potential fallout being undoubtedly more damaging than addressing the issue head-on. Ignore it, and you’re ghosting your smartest people and potential innovations in sight.
  3. Embrace (the adaptive approach). Identify why tools gain traction, then integrate them safely. For instance, if a logistics company notices drivers using Waze instead of approved routing software, they can partner with Waze to develop a custom enterprise version with shipment-tracking features. Good for efficiency and good for morale. In fact, at Trevolution, teams are given the freedom to explore and choose their own AI agents; we don’t have a centralized decision around what developers must use. Everyone is given the freedom to experiment and to test their own stack. Then we host workshops to cross-pollinate the best practices. From here on, during team meetings, innovation happens.  

Building better pathways  

Monitoring tools can detect unsanctioned tools, and IT leaders can then evaluate their impact without necessarily sacrificing innovation. Zero Trust architecture also helps. Instead of straight up banning external apps, one can just limit their access to sensitive systems.  

Essentially, I don’t view shadow IT as a problem to solve; instead, it’s a signal to interpret, which could (and should) serve as a wake-up call.  Many organizations to this day usually rely on IT teams to find, research and test new IT tools that could become the company’s standard. But what if solutions came from the bottom up, instead of the norm, which is top down? What if organizations rethought and reconsidered the tools based on what employees (i.e., actual users) find comfortable, easy-to-use and, by the end of the day, useful for their work and output they produce? Listen to the feedback!  

At Trevolution, we noticed some of our travel agents were using their own spreadsheet templates to track customer preferences and booking changes, bypassing the CRM system that was given to them to use. This way, their work moved faster. Instead of scolding them (which could have happened…), we dug in and realized our CRM wasn’t intuitive enough for real-time edits. Having involved both agents with the longest and shortest tenures to simply see how the workflow differs, we found a solution and have adapted the CRM.   

Tricky? No. Time consuming? Very much so, but in the end, it was a bottom-up solution that served the whole organization.  

In the end, the goal shouldn’t be to control every step but to design parks where people don’t need — nor want — to leave. The question isn’t whether shadow IT exists – because it does — but how organizations respond; it is up to you and your organization to decide. Because the grass will always be trodden where sidewalks don’t serve.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?


Read More from This Article: Restrict, ignore, embrace: The shadow IT trilemma
Source: News

Category: NewsJuly 8, 2025
Tags: art

Post navigation

PreviousPrevious post:Qué costes oculta el cambio de marca de Rise de SAPNextNext post:6 data risks CIOs should be paranoid about

Related posts

“AI 기반 미디어 분석이 해법”···오픈텍스트, 디지털자산 관리 혁신 전략 제시
January 13, 2026
IPOかM&Aか?スタートアップの「ゴール」で変わるストックオプションの現金化ルールと注意点
January 12, 2026
The retail innovation war – South Korea’s 1-hour shipping and store space innovation
January 12, 2026
The criticality of introducing AI into mission-critical systems
January 12, 2026
Building a product roadmap: From high-level vision to concrete plans
January 12, 2026
3 AI truths no one wants to hear — But will become reality in 2026
January 12, 2026
Recent Posts
  • “AI 기반 미디어 분석이 해법”···오픈텍스트, 디지털자산 관리 혁신 전략 제시
  • IPOかM&Aか?スタートアップの「ゴール」で変わるストックオプションの現金化ルールと注意点
  • The retail innovation war – South Korea’s 1-hour shipping and store space innovation
  • The criticality of introducing AI into mission-critical systems
  • Building a product roadmap: From high-level vision to concrete plans
Recent Comments
    Archives
    • January 2026
    • December 2025
    • November 2025
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.