If your business runs Microsoft 365 or Google Workspace, uses a CRM, an accounting platform, and a handful of industry tools, you are already operating in a SaaS ecosystem. The challenge is that SaaS ecosystems grow quietly: a team signs up for a “just for this project” platform, a contractor introduces a collaboration tool, or someone starts storing customer documents in a consumer file-sharing app because it feels faster.
In 2026, SaaS sprawl and Shadow IT are not just cost problems. They are identity problems, data governance problems, incident response problems, and—if you have cyber insurance or supply-chain requirements—assurance problems. The good news is that you can regain control without killing productivity. The goal is not to ban tools. The goal is to make them visible, owned, and governed.
Reality check: If a staff member leaves unexpectedly today, could you list every system they had access to, revoke access everywhere, and confirm where their data went? If the honest answer is “not sure”, you have a manageable risk—right now—before it becomes an incident.
Shadow IT is any software, service, or workflow used to process business data without formal oversight. It often starts with good intent: teams want smoother collaboration, quicker reporting, better automation, or fewer email attachments.
The problem is that Shadow IT tends to bypass the controls you rely on: MFA enforcement, auditing, device policies, backups, retention settings, and access reviews. Over time, it creates:
Subscription spend is the visible line item. The hidden costs often exceed it:
Control doesn’t mean bureaucracy. It means aligning tools with how you want the business to operate. A practical control model includes:
Start with what you know, then expand: review corporate card/bank statements for subscriptions, check your SSO portal for connected apps, and ask department leads what they rely on weekly. You don’t need perfection—just a baseline you can improve quarterly.
Here is the companion worksheet: SaaS Inventory & Access Review Worksheet
Not all tools deserve the same treatment. Classify each tool into a tier:
Tier 1 tools require stronger controls: enforced MFA, admin review, logging, and documented recovery paths. Tier 3 tools can be fine—if they don’t hold sensitive data.
Sprawl becomes a security issue when identity is fragmented. The strongest lever is standardising authentication: use SSO where possible, enforce MFA consistently, and avoid shared accounts. Where you cannot standardise, restrict what data can enter that tool.
Quick win: Start with finance and executive roles. Confirm their Tier 1 tools (email, accounting, CRM) enforce strong MFA and have alerting for risky activity (new admin, unusual login, new mailbox forwarding rules).
Every tool should have an owner—someone accountable for licensing decisions, admin access, and renewal reviews. Then implement a simple quarterly routine:
Virtus Group helps NZ SMBs regain SaaS control with a pragmatic, low-disruption approach:
If you want one outcome from this newsletter, make it this: get your tool inventory and ownership model in place. Once that is done, every other improvement becomes easier.