What is ‘Shadow IT’?
Shadow IT refers to the various web tools informally in use within most organisations. These tools are often chosen without reference to IT or to management in general.
They are often used for all the very best reasons. Your colleagues have work to do, and these tools help them, so they get used. You might know about some because there is a subscription charge, but others might be free.
These tools can be anything from simply keeping lists of tasks to do, sharing information or managing workflows, providing newsletter lists, or recruiting staff. Its endless.
There’s all sorts of web pages out there that your people will be finding useful and will be using.
The question is, do you know what is being used on your behalf?
Even more importantly, do you know who’s got access to them? As your staff come and go, do you know to change passwords or reset user accounts to make sure that no one who has left you (maybe even gone to a competitor) is still able to access your confidential data?
Shadow IT is one of the largest threats to data privacy in organisations today. It’s not necessarily because these sites are going to be hacked, although it’s always possible, but it’s because if you don’t know the tools are in use, then there is no way that you can manage them!
The first step to maintaining this data is to identify them, and that’s why you need new tools that are cloud focused.
If you’re still using the same old security tools that you used prior to the cloud, then you are simply not keeping up and we need to talk!
Here’s a story about what happens if you don’t have this under control: Why you need to know all the cloud services that your organisation uses – IT Solutions and Managed Services (new.outsource.co.nz/)
Shadow IT is part of our 10-point cyber-security check list
While there is no single layer of technology that can guarantee you will be safe from hackers, you can reduce your risk by adding layers of protection. How many of our 10-point check list are in place for you?
Webinar Replay: Decoding SMB1001. Understanding Your Cybersecurity Maturity
Cybersecurity certification doesn't have to be complex or overwhelming. Understanding SMB1001: What is SMB1001 and why it was created specifically for organisations like yours The five certification levels (Bronze to Diamond) and what each means for your organisation...
Empowering Craigs Investment Partners with Microsoft 365 Copilot
Accelerating AI Adoption Across a Nationwide Network When Craigs Investment Partners embarked on their AI journey, they weren’t simply looking for a training provider. They were looking for a partner who understood the pace, precision, and care required in a highly...
5 Ways AI Can Transform Your Annual Budget Planning Process
How New Zealand businesses are using AI to build smarter, faster budgets in 2026 March marks budget season for most New Zealand businesses. Finance managers face the familiar challenge: predicting next year's needs with this year's information while wrestling with...
Beyond Endpoint Protection – What is ITDR?
Your Microsoft 365 environment is where your business happens. It's also where attackers want to be. Most New Zealand businesses have invested in endpoint protection such as antivirus, EDR, or even MDR, but are they leaving a critical attack surface completely...
The Rise of The Machines
What OpenClaw and Moltbook Mean for Your Business If you've been following tech news lately, you've probably encountered OpenClaw. It's a viral AI agent that's sparking both excitement and anxiety across the business world. Originally called Clawdbot, then briefly...
AI Slop: The Rise, the Risk, and How to Stay Ahead
The Quiet Emergence of AI Slop As generative AI becomes part of everyday business workflows, a new challenge has begun to surface: AI slop. This refers to the growing volume of AI‑generated content that looks polished but adds little true value. It is the email that...
Manage My Health Data Breach – What We’ve Heard
What New Zealand Businesses Need to Learn from 126,000 Compromised Patient Records New Zealand's largest patient information portal confirmed a major cyber security breach on New Year's Eve, with up to 126,000 users potentially affected. The Manage My Health incident...
AI’s December Acceleration
6 Developments That Changed the Game (While You Were Planning for Christmas) December 2025 wasn't just about end-of-year planning. While New Zealand businesses were wrapping up 2025, AI platforms shipped features that fundamentally change how work gets done in...
Five Business IT Trends New Zealand Companies Should Watch in 2026
As we move into 2026, New Zealand businesses face a technology landscape where digital transformation is no longer optional.For NZ business managers preparing budgets and strategic plans for the year ahead, understanding the key IT trends will be critical to...
URGENT ADVISORY: We’re seeing a significant increase in authentication attacks this Christmas
Significant Hacking Trend Over this 2025/26 Christmas and New Year period, our Kinetics KARE security monitoring has detected a significant increase in sophisticated authentication attacks targeting New Zealand businesses. KARE Foundation clients are protected and...










