Shadow IT: What it is, why it exists and the 3 critical ways it puts your organisation at risk