{"id":26780,"date":"2024-10-22T08:39:58","date_gmt":"2024-10-22T07:39:58","guid":{"rendered":"https:\/\/licensedashboard.com\/?p=26780"},"modified":"2025-01-10T16:27:12","modified_gmt":"2025-01-10T16:27:12","slug":"shadow-it-discover-and-eliminate-threats","status":"publish","type":"post","link":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/","title":{"rendered":"The risks of Shadow IT: how to discover and eliminate hidden threats"},"content":{"rendered":"<div class=\"entry-content\">\n         \n    <div class=\"modal fade embed_modal\" id=\"form_block-block_0bcd6a8d52fdb0e38407482cff5440f1\" tabindex=\"-1\" role=\"dialog\"\n        aria-labelledby=\"team_block-block_0bcd6a8d52fdb0e38407482cff5440f1Title\" aria-hidden=\"true\">\n        <div class=\"modal-dialog modal-dialog-centered\" role=\"document\">\n            <div class=\"modal-content\">\n                <div class=\"modal-header\">\n                    <span id=\"team_block-block_0bcd6a8d52fdb0e38407482cff5440f1Title\" class=\"sr-only\">Embed Code Modal<\/span>\n                    <button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\">\n                        <span aria-hidden=\"true\">\n                            <i class=\"far fa-times\"><\/i>\n                        <\/span>\n                    <\/button>\n                <\/div>\n                <div class=\"modal-body p-5\">\n                                    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n\n     \n\n    <section id=\"block-block_0bcd6a8d52fdb0e38407482cff5440f1\"\n        class=\" internal-banner-block theme-bg-image\"\n         style=\"background: url(https:\/\/licensedashboard.com\/wp-content\/uploads\/2024\/10\/LD-FY25-Q3-Social-Media-Post-Nav-Shadow-IT-Social-Image-1.jpg)\" >\n                        <div class=\"container hover_bg\">\n                                                    <div class=\"row m-0 w-100\">\n                        <div class=\"col-xl-6 col-lg-6 col-md-11 col-sm-11 col-11 my-auto\">\n                                                            <h1 style=\"color: rgb(31,45,68);\">\n                                    The risks of Shadow IT: how to discover and eliminate hidden threats                                <\/h1>\n                            \n                            \n                            \n                            \n                                                                                        \n                                                    <\/div>\n\n                        <div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 text-right\">\n                                                    <\/div>\n                    <\/div>\n                            <\/div>\n    <\/section>\n\n\n\n\n\n \n\t \n\n\t     <section id=\"block-block_2d65a904aa795a1e362ad242e31184a5\" class=\"breadcrumb_holder pt-5 pb-5 p-0 m-0\">\n\t\t\t<div class=\"container\" >\n\t\t\t\t<div class=\"row w-100 m-0\"> \n\t\t\t\t\t<div class=\"col-12 col-md-12 my-auto\">\n\t\t\t\t\t\t<span><span class=\"breadcrumb_last\" aria-current=\"page\">Resource<\/span><\/span>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\n\n\n\n          \n\n    <section id=\"block-block_e1dc53a4e5e2d52d9b648a73f0d5feb0\" class=\"news-content-block\">  \n        <div class=\"container\">  \n         \n            <div class=\"post_det page-0\">\n                <p>22nd October 2024<\/p>\n                <p>Michaela Gray<\/p>\n                <p class=\"cat\">\n                                    Blog<span>,<\/span>\n                 \n                <\/p> \n            <\/div>\n        \n            <div class=\"row m-0 w-100\">\n                                                                    <div class=\"w-100 row mt-4 mb-4 ic ml-0 mr-0 col-12\">\n                            <div class=\"ord-1 my-auto\">\n                                <div class=\"col-xl-11 col-lg-11 col-md-12 col-12 p-0 mll\">\n                                  \n                                    <h3 ><\/h3>\n                                 \n\n                                                                    <p><span style=\"font-size: 22px;\">Shadow IT is the unapproved use of software, devices, or cloud services within an organisation. While it often starts with good intentions &#8211; like employees trying to streamline their work or find more efficient tools &#8211; it often becomes very dangerous. Uncontrolled software and systems often leads to security gaps, compliance failures, and increased costs.<\/span><\/p>\n<p><span style=\"font-size: 22px;\">We\u2019ll explore the risks of Shadow IT, how to discover it, and how to mitigate these risks with effective strategies, including software asset management (SAM).<\/span><\/p>\n<p><span style=\"font-size: 22px; color: #000000;\"><span style=\"font-weight: 400;\">\u00a0<\/span><\/span><\/p>\n                                \n                                                                <\/div>\n                            <\/div>\n\n                                                                <div class=\"ord-2 my-auto\" >\n                                                                                                                                    <img class=\"wpsmartcrop-image\" src=\"https:\/\/licensedashboard.com\/wp-content\/uploads\/2024\/10\/LD-FY25-Q3-Blogs-Webpage-Images9-Shadow-IT-1.png\" alt=\"a group of smiling office professionals \" \/>\n                                                                                    \n                                                                            <\/div>\n                                                    <\/div>                           \n                                                            <\/div>\n        <\/div> \n    <\/section> \n\n    \n\n\n\n          \n\n    <section id=\"block-block_4a778a4357ef1c0a7283b0a876256b1c\" class=\"news-content-block\">  \n        <div class=\"container\">  \n        \n            <div class=\"row m-0 w-100\">\n                                                                    <div class=\"w-100 row mt-4 mb-4 ic ml-0 mr-0 col-12\">\n                            <div class=\"col-12 p-0 my-auto\">\n                                <div class=\"col-xl-12 col-lg-12 col-md-12 col-12 p-0 mll\">\n                                  \n                                    <h3 ><\/h3>\n                                 \n\n                                                                    <h2><strong>What is Shadow IT?<\/strong><\/h2>\n<p>Shadow IT refers to software, apps, or cloud services used by employees without the knowledge or approval of the IT Team. It often goes unnoticed because people download tools to solve a quick problem, such as project management apps or cloud storage solutions. But even seemingly harmless tools can cause real damage if they\u2019re not properly managed.<\/p>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<h2><strong>The risks of Shadow IT\u00a0<\/strong><\/h2>\n<h3><strong>Security threats\u00a0<\/strong><\/h3>\n<p>The biggest danger posed by Shadow IT is security. When employees use unapproved software, the IT Team can\u2019t monitor or control it, leaving the organisation vulnerable to cyber attacks. Many of these tools are not configured with strong security features, meaning sensitive data can be exposed or stolen.<\/p>\n<p>For instance, a team might use an unauthorised file-sharing app to send sensitive documents, bypassing the secure channels that are in place. Without IT\u2019s oversight, these tools are left unpatched, increasing the risk of vulnerabilities.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Compliance risks<\/strong><\/h3>\n<p>Another major issue is compliance. Many industries are heavily regulated, with strict rules about data management and privacy (think GDPR). When employees use unauthorised software, it\u2019s almost impossible to ensure that the organisation complies with these regulations, putting your business at risk of fines and legal trouble.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Operational inefficiency<\/strong><\/h3>\n<p>Shadow IT can also disrupt workflows and create inefficiencies. When different departments use their own tools for the same tasks, it can lead to data silos and lack of collaboration, ultimately harming productivity. Imagine one team using one project management tool, while your other team uses another\u2014there\u2019s no shared access to information, which creates bottlenecks.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Financial waste\u00a0<\/strong><\/h3>\n<p>Finally, there\u2019s a cost issue. Shadow IT will lead to overspending on software that isn\u2019t necessary. Employees may sign up for multiple licenses of similar tools, often with ongoing subscription costs. Without visibility into these purchases, organisations often find they\u2019re wasting money on duplicated software and services.<\/p>\n                                \n                                                                <\/div>\n                            <\/div>\n\n                                                                                    <\/div>                           \n                                                            <\/div>\n        <\/div> \n    <\/section> \n\n    \n\n\n\n          \n\n    \n    <section id=\"block-block_be10c10ce7b50edeee18a1ffd9043c8e\" class=\"side-image-cta-block\" style=\"background: rgb(249,228,234);\">\n        <div\n            class=\"container-fluid p-0 align-left  hover_bg\">\n            <div class=\"row m-0 w-100 justify-content-center\">\n                <div class=\"col-xl-8 col-lg-8 col-md-12 col-sm-12 col-12 row m-0\">\n                                            <div class=\"my-auto col text-center\">\n                            <img src=\"https:\/\/licensedashboard.com\/wp-content\/uploads\/2024\/10\/LD-FY25-Q3-New-Nav-Pages-Website-Icons9.png\" alt=\"\"  \/>\n                        <\/div>\n                    \n                    <div class=\"my-auto col-xl-10 col-lg-10 col-md-12 col-sm-12 col-12 pt-5 pb-5\">\n                                                                                    <h3 style=\"color: ;\">IT and SAM news delivered straight to you<\/h3>\n                                                    \n                        \n                        \n                                                                                    <div class=\"mt-4 w-100\">\n                                    <script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\r\n<script>\r\n  hbspt.forms.create({\r\n    portalId: \"5756203\",\r\n    formId: \"8da47982-caa6-41d7-bff3-9f246492dd55\"\r\n  });\r\n<\/script>                                <\/div>\n                                                    \n                        \n                                            <\/div>\n                <\/div>\n\n                            <\/div>\n        <\/div>\n    <\/section>\n\n\n\n\n          \n\n    <section id=\"block-block_d1dc338e4abc76d9018cc072f7b4222f\" class=\"news-content-block\">  \n        <div class=\"container\">  \n        \n            <div class=\"row m-0 w-100\">\n                                                                    <div class=\"w-100 row mt-4 mb-4 ic ml-0 mr-0 col-12\">\n                            <div class=\"col-12 p-0 my-auto\">\n                                <div class=\"col-xl-12 col-lg-12 col-md-12 col-12 p-0 mll\">\n                                  \n                                    <h3 ><\/h3>\n                                 \n\n                                                                    <h2><strong>How to discover Shadow IT<\/strong><\/h2>\n<p>The first step in mitigating the risks of Shadow IT is identifying it. Here are a few practical ways to discover these hidden software and services in your organisation:<\/p>\n<ol>\n<li><span style=\"color: #e84070;\"><strong>Conduct a software audit<\/strong>:<\/span> regular software audits are essential to get a clear picture of the apps and services being used across your organisation. Use inventory management tools, like <a href=\"https:\/\/licensedashboard.com\/products\/license-manager\/\"><span style=\"color: #e84070;\">License Dashboard License Manager<span style=\"color: #000000;\">,<\/span><\/span><\/a> to scan the network for unapproved tools<\/li>\n<li><span style=\"color: #e84070;\"><strong>Monitor network traffic:<\/strong> <\/span>keeping an eye on network traffic will reveal a lot about how to discover Shadow IT. If you notice data being sent to unknown or unauthorised cloud services, that\u2019s a red flag. IT monitoring solutions can track and alert you to unusual activity, helping you uncover rogue software before it causes serious harm<\/li>\n<li><span style=\"color: #e84070;\"><strong>Employee surveys and reporting: <\/strong><\/span>encourage employees to report any software they\u2019re using that hasn\u2019t been approved by IT. Often, people turn to Shadow IT because they feel the existing tools aren\u2019t sufficient. By maintaining open communication, you will address their needs without compromising security<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Identifying and mitigating the risks<\/strong><\/h2>\n<p>Once you\u2019ve discovered Shadow IT, the next step is managing and mitigating its risks. Here\u2019s how:<\/p>\n<p><span style=\"color: #e84070;\"><strong>Software asset management (SAM): <\/strong><\/span>SAM is your best tool for controlling Shadow IT. By implementing a centralised system for managing software assets, you\u2019ll ensure that all tools used in the organisation are approved, secure, and licensed. SAM helps you track software from purchase to disposal, ensuring you\u2019re not using unapproved tools and aren\u2019t overpaying for licenses<\/p>\n<p><span style=\"color: #e84070;\"><strong>Strengthen IT policies:<\/strong><\/span> implement clear and enforceable IT policies around software procurement and usage. Make sure employees know how to request new software and ensure there\u2019s an easy-to-use approval process. The more difficult it is for staff to get access to the tools they need, the more likely they are to bypass IT<\/p>\n<p><span style=\"color: #e84070;\"><strong>Education and awareness<\/strong>:<\/span> sometimes, employees don\u2019t realise the risks of Shadow IT. Educate them on the potential security, compliance, and financial risks that unauthorised tools present. By making them part of the solution, you create a culture where Shadow IT is less likely to flourish<\/p>\n<p>For a deeper dive into effectively managing the risks posed by Shadow IT, check out our blog on <span style=\"color: #e84070;\"><a style=\"color: #e84070;\" href=\"https:\/\/licensedashboard.com\/resources\/how-to-develop-a-foolproof-risk-mitigation-strategy\/\">how to develop a foolproof risk mitigation strategy<\/a>.<\/span><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>Managing Shadow IT with SAM<\/strong><\/h2>\n<p>Ultimately, managing Shadow IT requires vigilance and the right tools. Software asset management provides visibility into software usage, while network monitoring solutions help discover hidden tools. Combining these strategies ensures your organisation can identify and mitigate the risks posed by unauthorised software, keeping your organisation safe from hidden threats.<\/p>\n<p>By taking steps to discover and eliminate Shadow IT, you will reduce business risks and keep your software environment secure, compliant, and cost-effective.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Ready to take control of shadow IT?<\/strong><\/h2>\n<p>Get in touch with our specialist to discover how our software asset management solutions will help you identify and eliminate hidden risks.<\/p>\n                                \n                                 \n                                    <a class=\"btn btn-primary hs-cta-trigger-button hs-cta-trigger-button-102586314120\" href=\"#GeneralEnquiry\" target=\"_blank\"  aria-label=\"Opens in a new tab\">\n                                        Contact us to find out more  \n                                    <\/a> \n                                                                <\/div>\n                            <\/div>\n\n                                                                                    <\/div>                           \n                                                            <\/div>\n        <\/div> \n    <\/section> \n\n     \n                            <section class=\"news-content-block author\">  \n                <div class=\"container\">  \n                    <div class=\"w-100 row pt-5 pb-5\">\n                        <div class=\"col-xl-2 col-lg-12 col-md-12 col-12 my-auto\">\n                                                        <span class=\"auth_p\">  \n                                <img src=\"https:\/\/licensedashboard.com\/wp-content\/uploads\/2023\/03\/Michaela-Gray_1x1.jpg\" alt=\"\" \/>\n                            <\/span>\n                             \n                        <\/div>\n\n                        <div class=\"col-xl-10 col-lg-12 col-md-12 col-sm-12 col-12 my-auto\">\n                                                            <p>Michaela has worked within the industry for over 11 years, both within sales and marketing. She works closely with the team to support them with all their marketing needs and maintains and promotes the License Dashboard brand.<\/p>\n                            \n                                                            <p class=\"name\">Michaela Gray<\/p>\n                                                    <\/div>\n                    <\/div>\n                <\/div>      \n            <\/section> \n                \n\n\n\n          \n\n    <section id=\"block-block_8241483dfd134a5221a7ddbbfc993967\" class=\"more-news-slider-block\">\n        <div class=\"container\">\n            <div class=\"w-100\">\n                                                            <h3 style=\"color: ;\">Further reading<\/h3>\n                                    \n\n                                    <div class=\"more-news-slider dark-slick-arrows slick-hide\">\n                         \n                            <div class=\"item latest-news-block\">\n                                <div class=\"news-slider h-100\">\n                                    <div class=\"item h-100\">\n                                        <div class=\"bg bg-white h-100\">\n                                                                                            <img src=\"https:\/\/licensedashboard.com\/wp-content\/uploads\/2024\/10\/shutterstock_632956724-1.jpg\"                                                     alt=\"The risks of Shadow IT: how to discover and eliminate hidden threats\" \/>\n                                            \n                                            <div class=\"w-100 cont\">\n                                                <h4>The risks of Shadow IT: how to discover and eliminate hidden threats<\/h4>\n                                                <p>Understanding cloud and application migration is essential as more and more organisations begin to move&hellip;<\/p>\n                                            <\/div>\n\n                                            <div class=\"w-100 mt-auto\">\n                                                <a href=\"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/\" class=\"btn btn-arrow-dark\">Read more<\/a>\n                                            <\/div>\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                         \n                            <div class=\"item latest-news-block\">\n                                <div class=\"news-slider h-100\">\n                                    <div class=\"item h-100\">\n                                        <div class=\"bg bg-white h-100\">\n                                                                                            <img src=\"https:\/\/licensedashboard.com\/wp-content\/uploads\/2026\/03\/shutterstock_2604008929-1-scaled.jpg\"                                                     alt=\"ITAM and FinOps: Why it\u2019s time these two worlds collide\" \/>\n                                            \n                                            <div class=\"w-100 cont\">\n                                                <h4>ITAM and FinOps: Why it\u2019s time these two worlds collide<\/h4>\n                                                <p>Discover why ITAM and FinOps must work together to give your organisation complete visibility and&hellip;<\/p>\n                                            <\/div>\n\n                                            <div class=\"w-100 mt-auto\">\n                                                <a href=\"https:\/\/licensedashboard.com\/en-gb\/resources\/itam-and-finops-why-its-time-these-two-worlds-collide\/\" class=\"btn btn-arrow-dark\">Read more<\/a>\n                                            <\/div>\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                         \n                            <div class=\"item latest-news-block\">\n                                <div class=\"news-slider h-100\">\n                                    <div class=\"item h-100\">\n                                        <div class=\"bg bg-white h-100\">\n                                                                                            <img src=\"https:\/\/licensedashboard.com\/wp-content\/uploads\/2026\/01\/shutterstock_2512678843-1.jpg\"                                                     alt=\"Why traditional SAM tools struggle in a subscription-first world\" \/>\n                                            \n                                            <div class=\"w-100 cont\">\n                                                <h4>Why traditional SAM tools struggle in a subscription-first world<\/h4>\n                                                <p>Discover why traditional SAM tools struggle with subscription software. Learn how centralised visibility simplifies tracking,&hellip;<\/p>\n                                            <\/div>\n\n                                            <div class=\"w-100 mt-auto\">\n                                                <a href=\"https:\/\/licensedashboard.com\/en-gb\/resources\/why-traditional-sam-tools-struggle-in-a-subscription-first-world\/\" class=\"btn btn-arrow-dark\">Read more<\/a>\n                                            <\/div>\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                         \n                            <div class=\"item latest-news-block\">\n                                <div class=\"news-slider h-100\">\n                                    <div class=\"item h-100\">\n                                        <div class=\"bg bg-white h-100\">\n                                                                                            <img src=\"https:\/\/licensedashboard.com\/wp-content\/uploads\/2026\/01\/shutterstock_2512678843-1.jpg\"                                                     alt=\"AI in ITAM: how AI could transform ITAM\" \/>\n                                            \n                                            <div class=\"w-100 cont\">\n                                                <h4>AI in ITAM: how AI could transform ITAM<\/h4>\n                                                <p>Discover how AI can transform IT Asset Management, improving visibility, optimising licensing, reducing risk, and&hellip;<\/p>\n                                            <\/div>\n\n                                            <div class=\"w-100 mt-auto\">\n                                                <a href=\"https:\/\/licensedashboard.com\/en-gb\/resources\/ai-in-itam-how-ai-could-transform-itam\/\" class=\"btn btn-arrow-dark\">Read more<\/a>\n                                            <\/div>\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                         \n                            <div class=\"item latest-news-block\">\n                                <div class=\"news-slider h-100\">\n                                    <div class=\"item h-100\">\n                                        <div class=\"bg bg-white h-100\">\n                                                                                            <img src=\"https:\/\/licensedashboard.com\/wp-content\/uploads\/2026\/01\/shutterstock_2512678843-1.jpg\"                                                     alt=\"What \u201cgood\u201d SAM looks like with the right tool in 2026\" \/>\n                                            \n                                            <div class=\"w-100 cont\">\n                                                <h4>What \u201cgood\u201d SAM looks like with the right tool in 2026<\/h4>\n                                                <p>Discover what effective software asset management looks like in 2026. Gain control, reduce waste, and&hellip;<\/p>\n                                            <\/div>\n\n                                            <div class=\"w-100 mt-auto\">\n                                                <a href=\"https:\/\/licensedashboard.com\/en-gb\/resources\/what-good-sam-looks-like-with-the-right-tool-in-2026\/\" class=\"btn btn-arrow-dark\">Read more<\/a>\n                                            <\/div>\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                         \n                            <div class=\"item latest-news-block\">\n                                <div class=\"news-slider h-100\">\n                                    <div class=\"item h-100\">\n                                        <div class=\"bg bg-white h-100\">\n                                                                                            <img src=\"https:\/\/licensedashboard.com\/wp-content\/uploads\/2025\/11\/shutterstock_2385072597-2-scaled.jpg\"                                                     alt=\"Why FinOps maturity matters\" \/>\n                                            \n                                            <div class=\"w-100 cont\">\n                                                <h4>Why FinOps maturity matters<\/h4>\n                                                <p>Explore why moving beyond basic FinOps to a mature model improves forecasting, governance, and collaboration&hellip;<\/p>\n                                            <\/div>\n\n                                            <div class=\"w-100 mt-auto\">\n                                                <a href=\"https:\/\/licensedashboard.com\/en-gb\/resources\/why-finops-maturity-matters\/\" class=\"btn btn-arrow-dark\">Read more<\/a>\n                                            <\/div>\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                         \n                            <div class=\"item latest-news-block\">\n                                <div class=\"news-slider h-100\">\n                                    <div class=\"item h-100\">\n                                        <div class=\"bg bg-white h-100\">\n                                                                                            <img src=\"https:\/\/licensedashboard.com\/wp-content\/uploads\/2025\/09\/shutterstock_1814674976-1.jpg\"                                                     alt=\"How to level up your FinOps maturity\" \/>\n                                            \n                                            <div class=\"w-100 cont\">\n                                                <h4>How to level up your FinOps maturity<\/h4>\n                                                <p>Improve your FinOps maturity with clear signs to watch for, practical steps to grow, and&hellip;<\/p>\n                                            <\/div>\n\n                                            <div class=\"w-100 mt-auto\">\n                                                <a href=\"https:\/\/licensedashboard.com\/en-gb\/resources\/how-to-level-up-your-finops-maturity\/\" class=\"btn btn-arrow-dark\">Read more<\/a>\n                                            <\/div>\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                                            <\/div>\n                                                <\/div>\n        <\/div>\n    <\/section>\n\n\n\n\n          \n\n    \n    <section id=\"block-block_60147054c97980cd94bcc16af55408c5\" class=\"cta-content-block theme-bg-alt\">\n        <div class=\"container style-alt\">\n            <div class=\"row m-0 w-100\">\n                <div class=\"col-xl-12 col-lg-12 col-md-12 col-sm-12 col-12 my-auto\">\n                                            <a class=\"btn-\" href=\"https:\/\/licensedashboard.com\/resources\/free-it-health-check\/\"\n                            target=\"_self\"                                 data-aos=\"fade-up\" >\n                            Contact us for a full online demo and free IT Health Check                        <\/a>\n                    \n                    \n                    \n                                    <\/div>\n            <\/div>\n        <\/div>\n    <\/section>\n\n<\/div>","protected":false},"excerpt":{"rendered":"Understanding cloud and application migration is essential as more and more organisations begin to move their assets over to new environments. Find out more now","protected":false},"author":20,"featured_media":26799,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[180],"tags":[],"class_list":["post-26780","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en-gb"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Shadow IT: how to discover and eliminate hidden threats<\/title>\n<meta name=\"description\" content=\"We\u2019ll explore the risks of Shadow IT, how to discover it, and how to mitigate these risks with effective strategies, including SAM.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shadow IT: how to discover and eliminate hidden threats\" \/>\n<meta property=\"og:description\" content=\"We\u2019ll explore the risks of Shadow IT, how to discover it, and how to mitigate these risks with effective strategies, including SAM.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"License Dashboard\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-22T07:39:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T16:27:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/licensedashboard.com\/wp-content\/uploads\/2024\/10\/shutterstock_632956724-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michaela Gray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Ben-Murden@phoenixs.co.uk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michaela Gray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shadow IT: how to discover and eliminate hidden threats","description":"We\u2019ll explore the risks of Shadow IT, how to discover it, and how to mitigate these risks with effective strategies, including SAM.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/","og_locale":"en_GB","og_type":"article","og_title":"Shadow IT: how to discover and eliminate hidden threats","og_description":"We\u2019ll explore the risks of Shadow IT, how to discover it, and how to mitigate these risks with effective strategies, including SAM.","og_url":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/","og_site_name":"License Dashboard","article_published_time":"2024-10-22T07:39:58+00:00","article_modified_time":"2025-01-10T16:27:12+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/licensedashboard.com\/wp-content\/uploads\/2024\/10\/shutterstock_632956724-1.jpg","type":"image\/jpeg"}],"author":"Michaela Gray","twitter_card":"summary_large_image","twitter_creator":"@Ben-Murden@phoenixs.co.uk","twitter_misc":{"Written by":"Michaela Gray","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/#article","isPartOf":{"@id":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/"},"author":{"name":"Michaela Gray","@id":"https:\/\/licensedashboard.com\/en-gb\/#\/schema\/person\/ee213d8c083ba51d2c8c01616ea65dd7"},"headline":"The risks of Shadow IT: how to discover and eliminate hidden threats","datePublished":"2024-10-22T07:39:58+00:00","dateModified":"2025-01-10T16:27:12+00:00","mainEntityOfPage":{"@id":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/"},"wordCount":12,"image":{"@id":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/licensedashboard.com\/wp-content\/uploads\/2024\/10\/shutterstock_632956724-1.jpg","articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/","url":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/","name":"Shadow IT: how to discover and eliminate hidden threats","isPartOf":{"@id":"https:\/\/licensedashboard.com\/en-gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/#primaryimage"},"image":{"@id":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/licensedashboard.com\/wp-content\/uploads\/2024\/10\/shutterstock_632956724-1.jpg","datePublished":"2024-10-22T07:39:58+00:00","dateModified":"2025-01-10T16:27:12+00:00","author":{"@id":"https:\/\/licensedashboard.com\/en-gb\/#\/schema\/person\/ee213d8c083ba51d2c8c01616ea65dd7"},"description":"We\u2019ll explore the risks of Shadow IT, how to discover it, and how to mitigate these risks with effective strategies, including SAM.","breadcrumb":{"@id":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/#primaryimage","url":"https:\/\/licensedashboard.com\/wp-content\/uploads\/2024\/10\/shutterstock_632956724-1.jpg","contentUrl":"https:\/\/licensedashboard.com\/wp-content\/uploads\/2024\/10\/shutterstock_632956724-1.jpg","width":1000,"height":667,"caption":"a group of smiling office professionals"},{"@type":"BreadcrumbList","@id":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"The risks of Shadow IT: how to discover and eliminate hidden threats","item":"https:\/\/licensedashboard.com\/en-gb\/resources\/shadow-it-discover-and-eliminate-threats\/"},{"@type":"ListItem","position":2,"name":"Resource"}]},{"@type":"WebSite","@id":"https:\/\/licensedashboard.com\/en-gb\/#website","url":"https:\/\/licensedashboard.com\/en-gb\/","name":"License Dashboard","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/licensedashboard.com\/en-gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/licensedashboard.com\/en-gb\/#\/schema\/person\/ee213d8c083ba51d2c8c01616ea65dd7","name":"Michaela Gray","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/licensedashboard.com\/en-gb\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d28f319fbe5d4953beb4dcccb8eaf928?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d28f319fbe5d4953beb4dcccb8eaf928?s=96&d=mm&r=g","caption":"Michaela Gray"},"description":"Michaela joined Phoenix in 2022 as a Senior Digital Marketing Specialist, bringing 13 years of experience across both sales and marketing. Her passion for creating engaging content and driving successful campaigns is reflected in her work across content creation, social media management, email marketing, SEO, and digital strategy. With a background in sales and account management, Michaela takes a customer-first approach, ensuring her marketing strategies align with business goals and audience needs. She is always eager to connect with fellow marketing professionals and stay ahead of industry trends.","sameAs":["https:\/\/x.com\/Ben-Murden@phoenixs.co.uk"]}]}},"_links":{"self":[{"href":"https:\/\/licensedashboard.com\/en-gb\/wp-json\/wp\/v2\/posts\/26780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/licensedashboard.com\/en-gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/licensedashboard.com\/en-gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/licensedashboard.com\/en-gb\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/licensedashboard.com\/en-gb\/wp-json\/wp\/v2\/comments?post=26780"}],"version-history":[{"count":10,"href":"https:\/\/licensedashboard.com\/en-gb\/wp-json\/wp\/v2\/posts\/26780\/revisions"}],"predecessor-version":[{"id":28778,"href":"https:\/\/licensedashboard.com\/en-gb\/wp-json\/wp\/v2\/posts\/26780\/revisions\/28778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/licensedashboard.com\/en-gb\/wp-json\/wp\/v2\/media\/26799"}],"wp:attachment":[{"href":"https:\/\/licensedashboard.com\/en-gb\/wp-json\/wp\/v2\/media?parent=26780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/licensedashboard.com\/en-gb\/wp-json\/wp\/v2\/categories?post=26780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/licensedashboard.com\/en-gb\/wp-json\/wp\/v2\/tags?post=26780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}