Too often, Shadow IT systems—those not authorized by IT—are used by the business to perform work. Here are a few common examples:
- A cloud storage system (such as SharePoint) may be authorized and managed by IT, but employees may use external cloud applications (such as Dropbox or Google Drive) when working with external vendors.
- A collaboration tool (such as Slack or Basecamp) may contain important information and documentation that are effectively invisible to the IT portfolio.
- Vast spreadsheets may exist across disparate programs, requiring manual reconciliation and long email chains for even the most minor changes.