{"id":95,"date":"2023-10-24T10:00:00","date_gmt":"2023-10-24T10:00:00","guid":{"rendered":"https:\/\/conscia.com\/uk\/?p=95"},"modified":"2025-07-14T09:41:21","modified_gmt":"2025-07-14T09:41:21","slug":"shining-a-light-on-shadow-it-in-your-organisation","status":"publish","type":"post","link":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/","title":{"rendered":"Shining a light on shadow IT in your organisation"},"content":{"rendered":"\n\n\n<p class=\" wp-block-paragraph\">As organisations grow and expand their operations, it\u2019s inevitable that IT needs will similarly increase. But while business is picking up pace and attentions focus on expansion, it\u2019s all too easy to overlook certain fundamental elements of user workflow and accessibility, giving rise to a phenomenon known as \u2018shadow IT\u2019 \u2013 assets used for business purposes that are unknown to or unmanaged by the IT team.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Shadow IT has traditionally been thought of in terms of physical devices that are still used for legitimate purposes, but that have dropped off or been missed by asset management practices, and so are not subject to policy enforcements that aim to protect against loss of sensitive data or malware infection. In the modern age, however, it\u2019s just as likely that an organisation\u2019s shadow IT assets extend into the cloud. Users who store sensitive organisational data in their own personal cloud accounts, even if no harm is intended, are in effect creating pockets of shadow IT outside the organisation\u2019s control. The greater the amount of shadow IT within an organisation, the more difficult any kind of risk assessment or effective policy enforcement becomes, because the organisation simply doesn\u2019t have complete knowledge of the assets that require protection. This is not an uncommon issue \u2013 in fact Gartner\u2019s 2023 \u2018<a href=\"https:\/\/www.skyhighsecurity.com\/lp\/2023-gartner-critical-capabilities-for-security-service-edge.html\">Critical Capabilities for Security Service Edge<\/a>\u2019 report indicates that total cloud usage could be up to ten times higher than many organisations realise.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Unsurprisingly, the most effective way to mitigate shadow IT is by tackling the root cause and prevent its creation in the first place. Generally, organisations will see much greater success tackling the underlying issues, rather than attempting to crack down on shadow IT creation through increasingly restrictive policies or punitive measures directed at the users. After all, it\u2019s rarely the case that shadow IT proliferates out of deliberate ill intent \u2013 instead, it usually comes from users struggling to do their jobs within the confines of the organisation\u2019s existing policies and tools. If an organisation\u2019s systems are a struggle to use, either delaying or degrading the end result, then employees will naturally feel tempted to circumvent them in order to make their lives easier and their work more effective.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">To avoid this pitfall, a good first step is to ensure that staff within the organisation feel comfortable raising issues in their workflow, and in calling out any limitations that require them to go outside of sanctioned tools and services. Examples might include having insufficient storage space (locally, or on the organisation\u2019s cloud services), restrictive measures around sharing data with third parties, not having an officially designated messaging or video conferencing tool, or even approved tools or services simply not providing required functionality. It may not be possible to instantly remedy all of these problems, but building a culture without blame will encourage users to highlight issues, and thereby help you to maintain a clear picture of the problem areas where shadow IT may arise.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">As well as looking for specific problem areas within the organisation, a broad review of how users are expected to work, followed by measures being put in place to reduce friction and frustration, will decrease the production of shadow IT. Restrictive lockdowns on organisational IT should be avoided wherever possible \u2013 stopping users from collaborating with external individuals using cloud storage, or not having sanctioned messaging services, may seem like security-minded policies, but if the end result has users circumventing the restrictions, then they\u2019re likely doing more harm than good. If employees require access to services outside of what is normally available, there should be a process already in place to grant this in a fast, but controlled, manner. Similarly, if unsanctioned services are frequently required, or solve an existing issue in user workflow, processes should exist to bring them under organisational control.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Physical, unmanaged devices are a somewhat simpler proposition, but often arise from the same environment \u2013 attempting to solve a problem that the organisation has left unaddressed. These can include IoT or smart devices that have been introduced without proper vetting or approval, personal devices that employees have connected to critical organisational networks, or equipment that provides vital functionality that has been misconfigured. Any device that is introduced without being configured by the organisation will likely not meet required security standards, and thereby pose a threat to the network and organisational resources. Working with deep visibility tools, network administrators can create a real-time inventory of all devices connected to the network, allowing for the identification and quarantining of these unmanaged devices, but again the underlying issues must be addressed if reoccurrence is to be avoided.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">The advent of home working has introduced a whole new set of complexities to the shadow IT conundrum. Without the right tools and oversight, administrators can be left without any visibility into the services and applications remote workers are accessing. Ideally, organisations should already have&nbsp;<a href=\"https:\/\/www.ncsc.gov.uk\/collection\/device-security-guidance\/bring-your-own-device\">strong BYOD (Bring Your Own Device) policies<\/a>&nbsp;in place, which not only regulate the use of personal devices, but also ensure that corporate data and resources on these devices remain secure. Of course, it\u2019s also essential to educate remote workers about the risks of using unsanctioned tools and the importance of adhering to company policies. The provision of organisational hardware to users, meanwhile, means that pre-installed solutions can be used to grant comparable visibility, even when users are not directly connected to the organisation\u2019s networks. If you need help bringing together a complete picture of your organisation\u2019s assets, and guidance on how to bring your shadow IT under control, we would love to talk further. You can get in touch at&nbsp;<a href=\"mailto:hello@itgl.com\">hello@itgl.com<\/a>&nbsp;to discuss your current situation, and how ITGL can help you achieve deep visibility into your organisation\u2019s assets and services.<\/p>\n\n\n\n<div id=\"block_acf-block-6866810d13e0e\" class=\"profile \">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy-300x300.jpeg\" class=\"profile__thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy-300x300.jpeg 300w, https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy-150x150.jpeg 150w, https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy.jpeg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t<div class=\"profile__info\">\n\t\t<a href=\"https:\/\/conscia.com\/uk\/profile\/andy-le-grice\/\" class=\"profile__meta\">\n\t\t\t<p class=\"profile__name\">Andy Le Grice<\/p>\n\t\t\t\t\t\t\t<p class=\"profile__title\">Security Practice Lead<\/p>\n\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>As organisations grow, it\u2019s easy for tools and workflows to evolve outside the oversight of IT\u2014creating shadow IT. From personal cloud accounts to unmanaged devices, these hidden assets pose serious risks to security and compliance. The key to tackling shadow IT isn\u2019t punishment or restriction, but understanding. When users turn to unsanctioned tools, it\u2019s often because existing systems don\u2019t meet their needs. Creating a culture of openness, reducing friction in approved workflows, and implementing tools that offer deep visibility are critical first steps. If you need help addressing shadow IT, contact us at\u202fhello@itgl.com to explore your options.<\/p>\n","protected":false},"author":2,"featured_media":96,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[],"global_partners":[],"global_industries":[],"global_business_outcome":[],"global_types":[],"class_list":["post-95","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Shining a light on shadow IT in your organisation - Conscia UK<\/title>\n<meta name=\"description\" content=\"Shadow IT poses growing risks as organisations expand and adopt cloud services. Learn how to identify unmanaged assets, reduce user workarounds, and improve visibility to strengthen security and control.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shining a light on shadow IT in your organisation\" \/>\n<meta property=\"og:description\" content=\"Shadow IT poses growing risks as organisations expand and adopt cloud services. Learn how to identify unmanaged assets, reduce user workarounds, and improve visibility to strengthen security and control.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia UK\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-24T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-14T09:41:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Shining-a-light-on-shadow-IT-in-your-organisation-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mikkel Elvej\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikkel Elvej\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/\"},\"author\":{\"name\":\"Mikkel Elvej\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3\"},\"headline\":\"Shining a light on shadow IT in your organisation\",\"datePublished\":\"2023-10-24T10:00:00+00:00\",\"dateModified\":\"2025-07-14T09:41:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/\"},\"wordCount\":981,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Shining-a-light-on-shadow-IT-in-your-organisation-image.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/\",\"url\":\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/\",\"name\":\"Shining a light on shadow IT in your organisation - Conscia UK\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Shining-a-light-on-shadow-IT-in-your-organisation-image.jpg\",\"datePublished\":\"2023-10-24T10:00:00+00:00\",\"dateModified\":\"2025-07-14T09:41:21+00:00\",\"description\":\"Shadow IT poses growing risks as organisations expand and adopt cloud services. Learn how to identify unmanaged assets, reduce user workarounds, and improve visibility to strengthen security and control.\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Shining-a-light-on-shadow-IT-in-your-organisation-image.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Shining-a-light-on-shadow-IT-in-your-organisation-image.jpg\",\"width\":1600,\"height\":1067},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shining a light on shadow IT in your organisation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/uk\/#website\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"name\":\"Conscia UK\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/uk\/#organization\",\"name\":\"Conscia UK\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"width\":628,\"height\":628,\"caption\":\"Conscia UK\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/itglconscia-uk\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3\",\"name\":\"Mikkel Elvej\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"caption\":\"Mikkel Elvej\"},\"url\":\"https:\/\/conscia.com\/uk\/blog\/author\/mhe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Shining a light on shadow IT in your organisation - Conscia UK","description":"Shadow IT poses growing risks as organisations expand and adopt cloud services. Learn how to identify unmanaged assets, reduce user workarounds, and improve visibility to strengthen security and control.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/","og_locale":"en_GB","og_type":"article","og_title":"Shining a light on shadow IT in your organisation","og_description":"Shadow IT poses growing risks as organisations expand and adopt cloud services. Learn how to identify unmanaged assets, reduce user workarounds, and improve visibility to strengthen security and control.","og_url":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/","og_site_name":"Conscia UK","article_published_time":"2023-10-24T10:00:00+00:00","article_modified_time":"2025-07-14T09:41:21+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Shining-a-light-on-shadow-IT-in-your-organisation-image.jpg","type":"image\/jpeg"}],"author":"Mikkel Elvej","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mikkel Elvej","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/"},"author":{"name":"Mikkel Elvej","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3"},"headline":"Shining a light on shadow IT in your organisation","datePublished":"2023-10-24T10:00:00+00:00","dateModified":"2025-07-14T09:41:21+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/"},"wordCount":981,"commentCount":0,"publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"image":{"@id":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Shining-a-light-on-shadow-IT-in-your-organisation-image.jpg","articleSection":["Uncategorized"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/","url":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/","name":"Shining a light on shadow IT in your organisation - Conscia UK","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Shining-a-light-on-shadow-IT-in-your-organisation-image.jpg","datePublished":"2023-10-24T10:00:00+00:00","dateModified":"2025-07-14T09:41:21+00:00","description":"Shadow IT poses growing risks as organisations expand and adopt cloud services. Learn how to identify unmanaged assets, reduce user workarounds, and improve visibility to strengthen security and control.","breadcrumb":{"@id":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#primaryimage","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Shining-a-light-on-shadow-IT-in-your-organisation-image.jpg","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Shining-a-light-on-shadow-IT-in-your-organisation-image.jpg","width":1600,"height":1067},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/uk\/blog\/shining-a-light-on-shadow-it-in-your-organisation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Shining a light on shadow IT in your organisation"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/uk\/#website","url":"https:\/\/conscia.com\/uk\/","name":"Conscia UK","description":"","publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/conscia.com\/uk\/#organization","name":"Conscia UK","url":"https:\/\/conscia.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","width":628,"height":628,"caption":"Conscia UK"},"image":{"@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/itglconscia-uk\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3","name":"Mikkel Elvej","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","caption":"Mikkel Elvej"},"url":"https:\/\/conscia.com\/uk\/blog\/author\/mhe\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/95","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/comments?post=95"}],"version-history":[{"count":3,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/95\/revisions"}],"predecessor-version":[{"id":830,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/95\/revisions\/830"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media\/96"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media?parent=95"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/categories?post=95"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_solutions?post=95"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_partners?post=95"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_industries?post=95"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_business_outcome?post=95"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_types?post=95"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}