Mark One Consultants Blog - IT news & technology tips

Our Channel

Sharing our news with you.

The world of IT moves fast - really fast. We have created this space so we can share with you the most relevant news, reviews and information from around the IT and Mark One world.

Content type

Content categories

Channel

 > 

Blog

 > 

News


The Quiet Rise of Shadow IT and Why It Matters to UK Businesses

by Jon Budzynski - Thu 07 May 2026
News
MarkOne

In many organisations, the biggest technology risks are not always found in the server room, the firewall or the company laptop. Increasingly, they are found in the everyday tools that staff quietly adopt to get work done.

A free file-sharing account. A personal device used to access work emails. A project management app set up by one department. An AI tool used to summarise meeting notes. None of these decisions may seem especially serious in isolation. In fact, they often come from good intentions. Staff want to move quickly, collaborate better and avoid unnecessary delays.

This is the world of shadow IT. It is becoming more common across UK businesses, charities and not-for-profit organisations, and it deserves more attention than it often receives.

 

What is shadow IT?

Shadow IT refers to any technology used within an organisation without the knowledge, approval or management of the person or team responsible for IT.

That might include software, cloud platforms, devices, mobile apps, artificial intelligence tools, storage services or online accounts. The issue is not simply that these tools exist. It is that they sit outside the organisation’s normal security, compliance, backup and support arrangements.

Common examples include staff using personal cloud storage to share work files, teams signing up for project management tools without approval, employees using personal devices for business tasks, or confidential information being entered into free online tools.

For many SMEs and charities, shadow IT does not appear all at once. It builds gradually. A workaround becomes a habit. A habit becomes a process. Before long, business-critical information may be spread across systems that no one is managing properly.

 

Why shadow IT is growing

Shadow IT is rarely a sign that staff are trying to undermine the organisation. More often, it is a sign that people are trying to solve practical problems.

Employees turn to unofficial tools because approved systems may feel slow, outdated, restrictive or poorly suited to the way they work. A team may need to share files with an external partner. A volunteer may need access to documents from home. A manager may need a quick way to track tasks. A fundraiser may want to create marketing content more efficiently.

Cloud services have made this easier than ever. Many tools can be set up in minutes with only an email address and a password. Some are free. Others offer low-cost monthly subscriptions. They look professional, feel convenient and often work well from the user’s perspective.

The problem is that convenience does not always equal control.

 

The risks for UK businesses

Shadow IT can create significant risks for UK organisations, especially where personal data, financial information, confidential documents or operational processes are involved.
One of the biggest issues is visibility. If staff upload business data into an unapproved cloud platform, the organisation may lose track of where that data is stored, who can access it and how it is protected. This matters for customer records, staff information, supplier contracts, donor data, safeguarding notes and financial documents.

Security is another concern. Approved business systems should usually be protected by measures such as multi-factor authentication, access controls, encryption, device management and monitoring. Unofficial tools may not meet the same standard. A personal account with a reused password could become an easy entry point for cyber criminals.

There is also a backup and business continuity risk. Many organisations assume their important data is backed up, but that may only apply to approved systems. If key documents are stored in personal accounts, unmanaged apps or unofficial devices, they may fall outside normal backup and disaster recovery arrangements.

Costs can quietly increase too. Different departments may pay for overlapping tools that do similar things. Licences may continue long after they are needed. The organisation may already have equivalent features through Microsoft 365 or another approved platform but not realise it.

 

Why charities and NGOs should pay attention

Charities and NGOs often have a more complex technology environment than they realise.

They may work with part-time staff, volunteers, trustees, fundraisers, contractors and partner organisations. Many people may need access to documents, email, cloud systems or shared resources from different locations and devices. Budgets are often limited, and technology decisions may be made quickly to meet an urgent operational need.
That creates ideal conditions for shadow IT.

A volunteer might use a personal email account to contact supporters. A trustee might store board papers in a personal cloud drive. A fundraising team might use a free design or data tool. A project worker might share beneficiary information through an unofficial messaging app because it feels faster than the approved process.

For charities, the risks can affect donor data, safeguarding information, beneficiary details, funding reports, financial documents and trustee papers. The reputational impact of a data incident can be serious, particularly when supporters, funders and beneficiaries expect sensitive information to be handled carefully.

Better IT governance does not need to make charity work slower. Done well, it should make secure working easier, clearer and more cost-effective.

 

Shadow IT and workplace AI

Artificial intelligence has added a new dimension to shadow IT.

Many staff are now experimenting with AI tools to draft emails, summarise documents, analyse information, write reports, prepare presentations or generate ideas. Used carefully, AI can be genuinely useful. It can save time and improve productivity, particularly for smaller organisations with limited resources.

However, problems arise when staff enter confidential, personal or commercially sensitive information into tools that have not been approved.

Businesses and charities should be asking practical questions. What AI tools are staff using? What information are they putting into those tools? Are there clear rules on what can and cannot be shared? Are approved AI features available within existing platforms, such as Microsoft 365?

AI should not be treated as a separate issue from IT governance. It is now part of the wider conversation about data protection, security, productivity and acceptable use.

 

How to reduce shadow IT without slowing people down

The answer to shadow IT is not simply to ban everything. If staff are using unofficial tools because approved systems do not meet their needs, a strict ban may simply push the problem further out of sight.

A better approach is to understand why shadow IT is happening and then provide safer, approved alternatives.

1. Find out what is being used
Start by reviewing the tools, devices and cloud services being used across the organisation. This should not feel like a blame exercise. The aim is to improve security, reduce duplication and make technology easier to use.

2. Create a simple approved software list
Every organisation should have a clear list of approved tools for common tasks such as file sharing, communication, project management, video meetings, password management and document storage. Staff should know what to use and who to speak to if they need something different.

3. Make better use of Microsoft 365
Many UK businesses and charities already pay for Microsoft 365 but do not use it to its full potential. Depending on the licence and configuration, Microsoft 365 can support secure file sharing, Teams collaboration, device management, data protection, identity controls and productivity improvements.

A well-configured Microsoft 365 setup can reduce the temptation for staff to find their own workarounds.

4. Strengthen access and device management
Access should be based on role, need and risk. Staff, volunteers and trustees should only have access to the systems and data they genuinely need. Multi-factor authentication should be enabled wherever possible, especially for email, cloud storage and administrative accounts.

Devices also need proper management. Laptops, mobiles and tablets used to access business data should have appropriate security settings, particularly for organisations with hybrid teams, field workers or volunteers.

5. Provide clear policies and practical training
Policies do not need to be long or complicated. A good acceptable use policy should explain which tools are approved, how data should be handled, what staff should avoid, and how to request new software or services. It should also cover AI tools, personal devices and personal cloud storage.

Training should focus on everyday scenarios. For example, whether it is safe to upload a spreadsheet to an online converter, how to share a file securely, why personal email should not be used for work documents, or what information should not be entered into AI tools.

 

Shadow IT is a leadership issue

Shadow IT is not purely a technical problem. It touches governance, risk, finance, productivity, compliance and culture.

Senior leaders, trustees and managers all have a role to play in setting expectations and making sure staff have the right tools to work securely. The organisations that manage shadow IT most effectively are not necessarily the ones with the strictest rules. They are the ones that combine good technology with clear communication, practical training and sensible oversight.

Shadow IT can feel worrying, but it also reveals something useful. It shows where staff need better tools, smoother processes or clearer guidance.

For UK SMEs, this can be an opportunity to reduce risk, improve productivity and get more value from existing technology investments. For charities and NGOs, it can support stronger governance, better data protection and more confident digital working across staff, volunteers and trustees.

The goal is not to stop people using modern tools. The goal is to make sure the right tools are used in the right way.

 

How Mark One Consultants can help

Mark One Consultants works with businesses, charities and organisations across Somerset, the South West and the wider UK to make technology more secure, manageable and effective.

Whether you need to review your Microsoft 365 environment, improve cyber security, manage devices, strengthen backup and disaster recovery, or create a practical IT roadmap, our team can help you regain visibility and control without making everyday work harder.
If you are unsure what tools your staff are using, or whether your current systems are supporting people properly, now is a good time to take a closer look.

Speak to Mark One Consultants about a practical IT review and find out where shadow IT may be creating hidden risk in your organisation.


You might also be interested in...

Disaster Recovery Planning for UK NGOs...

Disaster Recovery Planning for UK NGOs...

Thu 30 Apr 2026
Helping Thrive Unlock the Power of Charitylog

Helping Thrive Unlock the Power of Charitylog

Thu 15 Jan 2026
Show more
Would you pass an IT MOT?

We have developed a detailed Measure of Technology (MOT) for your business that will analyse and review your IT infrastructure and provide you with a system health check. Once our qualified technician has completed the MOT you will receive a detailed report on your IT infrastructure, including; future advisories, minor defects, and system critical defects (SCD).

  • Performed by qualified technicians
  • Conducted face-to-face at your premises
  • Comprehensive report upon completion
  • 50% off for a limited time!