
Prevent Healthcare Data Breaches: A 12-Step Guide
Data Breach Healthcare Security
Why Is Healthcare the Most Expensive Industry for Data Breaches? If you’re trying to figure out how to prevent data …

Learn what shadow IT is, why employees use it, and how to manage it without killing productivity.
• Shadow IT is any software or hardware your employees use for work without IT approval. It’s not malicious. It’s usually someone trying to get their job done faster than your procurement process allows.
• The security risk isn’t the tool itself. It’s the credentials. When employees sign up for unapproved services with their work email and reuse passwords, those credentials leak when the service gets breached. You find out when attackers log into your VPN with a password your employee reused on a SaaS tool you didn’t know they were using.
• Shadow AI is the fastest-growing form of shadow IT. Employees paste proprietary data into ChatGPT, use unauthorized Copilot instances, or build workflows with AI tools IT never vetted. IBM found shadow AI involvement in 20% of breaches, adding $670K to average breach costs.
• You can’t eliminate shadow IT. Employees will always find workarounds when approved tools are slow or inadequate. The goal is discovery and risk management, not prohibition.
Your employees are using tools you don’t know about. Cloud apps, AI assistants, personal devices, browser extensions. They signed up with their work email and probably reused a password.
That’s shadow IT. The problem isn’t the tools themselves. It’s the credentials that leak when those tools get breached and the company data that ends up in systems you can’t control.
This guide covers what shadow IT means in cyber security, the risks it creates, how to find it, and how to build a policy that works.
Shadow IT is any technology your employees use for work that IT didn’t approve. Someone signs up for a project management tool with their work email. A developer uses a code snippet tool IT never vetted. A marketing team shares files through a personal Dropbox instead of the approved storage platform.
Shadow IT is the use of software, hardware, or cloud services for work purposes without the knowledge or approval of the IT department. It happens when employees find tools that solve their problems faster than official channels allow.
Shadow IT covers everything from a browser extension to a full SaaS platform. In cyber security, it’s one of the biggest sources of unknown credential exposure. What makes it “shadow” isn’t that it’s dangerous. It’s that IT doesn’t know it exists.
Most shadow IT comes from good intentions. The causes are predictable: slow IT procurement, clunky approved tools, BYOD policies that blur the line between personal and work devices, and teams that need to move faster than the approval process allows. The problem isn’t the tool. It’s the gap between what employees need and what IT provides.
Shadow IT shows up in every department. Here are the most common examples of shadow IT:
File sharing and storage. Personal Dropbox, Google Drive, or OneDrive accounts used for company documents. Employees do this when the approved storage is hard to share externally or has file size limits.
Communication tools. Slack, Discord, WhatsApp, or Signal used for team conversations when the official communication platform is clunky or missing features.
Project management. Trello, Asana, or Notion adopted by individual teams without IT knowing. These often contain sensitive project details and client information.
Personal devices. Smartphones and laptops used for work email and company apps that IT doesn’t manage or monitor. This is especially common with remote workers.
Browser extensions. Grammar checkers, screenshot tools, password managers, and productivity extensions that have access to everything in the browser, including company data.
Development tools. Unauthorized code repositories, IDE plugins, and testing environments. Developers are some of the most prolific shadow IT users because they need tools fast.
AI tools. This is the fastest-growing category. Employees using ChatGPT, Copilot, Claude, or other AI assistants for writing, analysis, and code generation. More on this below.
Shadow IT security risks fall into a few categories.
This is the biggest risk and the one most companies miss. When employees sign up for shadow IT services with their work email and reuse passwords, those credentials become a liability. If the service gets breached, work email and password combinations end up on criminal markets. Attackers test them against your VPN, SSO, and email.
Credential monitoring catches these exposures because it scans for your domains across breach data and stealer logs, including services you didn’t know your employees were using.
Unapproved tools store company data outside your control. A personal Google Drive with client contracts. A Notion workspace with product roadmaps. When IT doesn’t know about these tools, the data in them doesn’t get backed up, encrypted, or protected by your security controls.
Regulated industries face specific risks. If employees store health records in an unapproved cloud app, that’s a HIPAA violation. Customer data in an unvetted tool violates GDPR. Financial data outside approved systems breaks PCI-DSS and NIST requirements. Shadow IT makes compliance audits a guessing game because you don’t have a full picture of where data lives.
You can’t protect what you don’t know about. Shadow IT creates gaps in your monitoring. If an employee’s account on an unapproved service gets compromised, your SIEM won’t see it. Your EDR won’t detect it. Your incident response team won’t know to investigate it.
When shadow IT services go down or an employee who managed an unofficial system leaves, there’s no backup plan. Critical workflows break. Data disappears. Knowledge walks out the door.
Shadow AI is the newest and fastest-growing form of shadow IT. Employees use AI tools like ChatGPT, GitHub Copilot, or Claude for work without telling IT.
Shadow AI is the unauthorized use of AI tools for work purposes. Employees paste proprietary data, customer information, or source code into AI systems that haven’t been vetted for security or data handling by the IT department.
IBM’s 2025 Cost of a Data Breach Report found that shadow AI was involved in 20% of breaches, adding $670,000 to the average breach cost. It’s not theoretical. It’s happening now.
The risk isn’t that employees use AI. It’s that they paste sensitive data into AI tools without understanding where that data goes or who can access it. Company financials into ChatGPT. Customer lists into a data analysis tool. Source code into an AI coding assistant. Once that data enters an unvetted system, you’ve lost control of it.
Managing shadow AI requires the same approach as managing other shadow IT: provide approved AI tools that meet security requirements, so employees don’t need to find their own.
Before you can manage shadow IT, you need to find it. Here’s how.
Network traffic analysis. Monitor what your network connects to. Connections to unknown cloud services are a strong signal.
CASB tools. Cloud Access Security Brokers discover cloud services being used across your company, even from outside the corporate network.
DNS monitoring. Check DNS queries for connections to unapproved services. Spikes to new SaaS domains are worth investigating.
External attack surface management. EASM finds shadow IT resources that are publicly exposed on the internet, even if they’re not in your asset inventory.
Expense report audits. Look for SaaS subscriptions on corporate credit cards and expense reports. If someone is expensing a tool IT didn’t approve, that’s shadow IT.
Employee surveys. Ask. Most employees don’t hide shadow IT on purpose. They just didn’t think to tell IT. A simple survey often reveals tools you didn’t know about.
Dark web monitoring. When credentials for unknown services show up in breach data, that’s evidence of shadow IT. Your employees used their work email on a service you didn’t know existed, and now those credentials are exposed.
A shadow IT policy defines what employees can adopt on their own and what needs IT approval. The key: make the approval process fast enough that employees don’t need to go around it.
Define tiers. Not everything needs the same level of review. A free note-taking app is different from a CRM that stores customer data. Create tiers: self-service (low risk), quick review (medium risk), full assessment (high risk).
Speed up procurement. If approving a new tool takes 3 months, employees will find alternatives. Target 1-2 weeks for standard requests. Fast procurement is the best shadow IT prevention.
Maintain an approved tools catalog. Give employees a list of vetted alternatives for common needs. If they need file sharing, point them to the approved option. If there isn’t one, that’s IT’s problem to solve.
Cover AI explicitly. Your policy needs to address AI tools specifically. Which AI tools are approved? What data can employees input? Where is the line between experimentation and risk?
For a full framework, see our shadow IT policy guide.
Managing shadow IT requires tools that find what you don’t know about.
CASBs (Cloud Access Security Brokers) are the primary shadow IT discovery tools. They monitor cloud usage across your company and flag unapproved services. Gartner’s CASB market guide covers the major vendors including Microsoft Defender for Cloud Apps and Netskope.
EASM platforms scan the internet for assets associated with your company, including shadow IT resources employees exposed publicly. Breachsense EASM combines this with dark web monitoring to catch both the exposed asset and any credentials leaked from it.
SaaS management platforms like Zylo, Productiv, and Torii discover SaaS usage through SSO integrations, browser extensions, and financial data. They show you every SaaS app in use and who’s using it.
Network monitoring tools analyze traffic patterns to find connections to unknown services. These work at the infrastructure level and catch shadow IT that other methods miss.
The best approach combines multiple tools. CASBs catch cloud apps. EASM catches publicly exposed resources. Credential monitoring catches the breaches that result from shadow IT you missed.
Shadow IT isn’t going away. Employees will always find workarounds when approved tools don’t meet their needs. Banning it outright doesn’t work.
Instead, discover what’s running. Assess the risk. Provide approved alternatives for common needs. Make your approval process fast enough that going around IT isn’t worth the hassle.
The biggest risk isn’t the shadow IT itself. It’s what you can’t see: credentials leaking from services you didn’t know your employees used, and company data sitting in tools you can’t monitor. Check your exposure to see if your employees’ credentials from shadow IT services are already on criminal markets.
Shadow IT is any technology your employees use for work without IT department approval. This includes cloud apps, personal devices, browser extensions, and AI tools. It happens when official tools are too slow, limited, or hard to access.
Personal Dropbox or Google Drive for file sharing, Slack or Discord for team chat, Trello for project management, personal phones for work email, ChatGPT for writing or analysis. Anything employees use for work that IT didn’t approve.
When employees sign up for services with their work email, those credentials are at risk if the service gets breached. Reused passwords make it worse. Shadow IT also creates data exposure you can’t monitor because you don’t know the tools exist.
Network traffic analysis, CASB tools, DNS monitoring, external attack surface management, and expense report audits. Most discovery methods work by looking at what your network connects to that isn’t in your approved list.
A document that defines what employees can adopt on their own, what requires IT approval, and the process for requesting new tools. Good policies make approval fast enough that employees don’t need to go around IT. See our shadow IT policy guide.
Shadow AI is employees using AI tools like ChatGPT, Copilot, or Claude for work without IT approval. The risk is that employees paste proprietary data, customer information, or code into AI systems that IT hasn’t vetted for data handling.

Data Breach Healthcare Security
Why Is Healthcare the Most Expensive Industry for Data Breaches? If you’re trying to figure out how to prevent data …

Brand Protection Phishing Detection Dark Web Monitoring Counterfeit Protection Security Tools
What Are the Best Brand Protection Platforms? Brand protection software covers a wide range of threats. Some platforms …