Complexity Kills Compliance

Compliance rarely goes wrong because organizations don't have policies. It goes wrong because policies become too complicated in practice. Once employees have to deal with cumbersome processes, extra steps, loose portals and unclear exceptions, they look for a faster route. And that's exactly where the problem begins. What seems secure and compliant on paper quickly turns into shadow IT, workarounds and invisible risks in daily operations.
Complexity Kills Compliance

Compliance rarely goes wrong because organizations don’t have policies. It goes wrong because policies become too complicated in practice. Once employees have to deal with cumbersome processes, extra steps, loose portals and unclear exceptions, they look for a faster route. And that’s exactly where the problem begins. What seems secure and compliant on paper quickly turns into shadow IT, workarounds and invisible risks in daily operations.

The British NCSC explicitly calls shadow IT a risk, because unknown assets are not included in asset management or policies and can therefore lead to data exfiltration or malware. The Dutch NCSC describes the same mechanism: employees use hardware or software without the organization’s knowledge or permission.

Compliance breaks down on complexity

Shadow IT arises where policy clashes with practice

Shadow IT is not usually a rebellion against IT or compliance. It is often a symptom of friction. People want to get their work done, help customers, share documents or meet deadlines. If the official route is too slow, too technical or too inconvenient, they opt for what feels easiest at the time. That may be a private cloud, an unmanaged link, a consumer app or another tool that is outside of policy. Precisely because those tools operate out of sight, the organization loses control of access, logging, retention and governance.

The human factor remains the biggest weakness

That the human factor weighs heavily is not an assumption but a recurring pattern in breach research. In the 2025 Verizon Data Breach Investigations Report, the human component in breaches hovered around 60 percent. That doesn’t mean people are the problem, but it does mean that processes that rely too much on perfect human actions remain vulnerable. The more complexity you add, the more likely someone will skip a step, choose the wrong tool or work outside the process.

Every workaround is a potential data breach

Small mistakes become big when processes are fragile

The practical examples are painfully concrete. The Police Service of Northern Ireland received a fine of £750,000. There, hidden data in a spreadsheet led to the disclosure of personal data of 9,483 employees. The ICO was remarkably clear about this: “simple-to-implement procedures” could have prevented this serious incident. That is exactly the point of this article. It’s not just bad intentions that cause data breaches; it’s fragile, unnecessarily complex processes that do.

What these examples really show

The lesson is that compliance depends not only on rules, but on process design. If an employee has to share a file under time pressure, the safe route should be the easiest route. Otherwise, the workaround almost always wins. Moreover, the ICO emphasizes that the first 72 hours after a data breach is discovered are crucial: start a log immediately, gather facts, try to contain the incident and report it where necessary within 72 hours. Organizations that only have to figure out exactly what was shared after an incident are already behind the times.

Less friction, more control

Secure file sharing should be easier than the workaround

Therein lies precisely the relevance of Msafe. Msafe Secure File Transfer is the way to exchange sensitive files. With provable logging and policies around permissions, expiry and 2FA.

That simplicity is not an afterthought, but a compliance check. The Msafe Outlook add-in works plug-and-play. It requires no additional infrastructure or complex integrations and that implementation takes only minutes. The user-friendly interface reduces the need for training and accelerates adoption. This is especially important in organizations where compliance breaks down due to cumbersomeness. As secure file sharing is simple to implement and easy to use, the need to resort to shadow IT decreases.

Monitor and intervene before it escalates

Simplicity alone is not enough. You also need to be able to see when policies are violated. With the help of comprehensive audit trails and exportable reports, you can quickly see whether policies that have been set are being met. That means organizations can not only share more securely, but also identify more quickly when a file is being shared incorrectly, when access needs to be revoked or when further investigation is needed.

The real promise behind “Complexity Kills Compliance”

Compliance becomes stronger when you remove complexity from behaviors that recur daily. Secure file sharing is a perfect example. Employees simply share documents with customers, suppliers, auditors and partners. So the question is not whether that happens, but whether it happens through a channel that is simple enough to be used and strong enough to provide evidence, control and intervention capabilities. Make it easy then employees make fewer wrong decisions.

Share:

More Posts

How do companies comply with GDPR guidelines
Blog

How do companies comply with GDPR guidelines? And why secure file transfer is essential in this

To comply with GDPR guidelines, a privacy statement or secure tool is not enough. Companies must process personal data lawfully, respect privacy rights, take appropriate security measures, manage data breaches and be able to demonstrate that they have their processes in order. The Personal Data Authority lists foundations, privacy rights, security, DPIAs in high-risk situations and accountability among the core components of AVG compliance.

Read More »
provable-compliance-without-complexity-hennie-jansen
Blog

Proving compliance without complexity: interview with Hennie Jansen, CCO of Msafe

Following our Compliance Summit, ITinsight conducted an interview with Hennie Jansen, Msafe’s CCO. The theme is provable compliance without complexity. Hennie Jansen indicates that it is not a slogan. “It’s a way to bring security, compliance and business closer together. And organizations that get that right in 2026 are building not only better audits, but also more trust, more control and more operational peace of mind.”

Read More »
KPMG research- why compliance in 2026 calls for Secure File Sharing
Blog

KPMG study: why compliance in 2026 calls for Secure File Sharing

Why is a Secure File Sharing solution indispensable in a good compliance policy? KPMG says in essence, organizations are facing more compliance pressures, increased privacy and cybersecurity requirements, and a growing need for monitoring, reporting and control. Our Msafe Secure File Transfer solution is perfect for an environment where sensitive files are exchanged encrypted, access-controlled and fully traceable.

Read More »
Automate secure file sharing with the Msafe API
Blog

Automate secure file sharing with the Msafe API

More and more organizations want to automate file sharing. No longer manually uploading, sending and storing, but rather integrating secure file sharing directly into existing processes and systems. Msafe’s API makes this possible. Through an API, applications can automatically upload, share and link files to internal systems such as CRM or document management systems.

Read More »
Can the US simply access Msafe data
Blog

Can the US just access Msafe data?

Your data resides with Msafe on Microsoft Azure in the Netherlands, with Microsoft Ireland as the contracting party. Yet we often hear the question: can U.S. legislation, such as the U.S. CLOUD Act, affect the sovereignty of customer data? In this article we clearly explain what the U.S. can and cannot enforce, why data location is not the same as jurisdiction, and how often this occurs in practice. We also show what measures Msafe deploys to minimize risk: EU hosting, client-side/end-to-end encryption, strict access with MFA and policies, and full audit trails. So that you can share securely and remain demonstrably compliant.

Read More »
why email is obsolete technology
Blog

Why email is obsolete technology

Email is still the default channel in virtually every organization, but it was technically and organizationally designed for an Internet where “trust” was the default. In 2026, the reality is different: email is at once productivity inhibitor, risk accelerator and compliance headache.

Read More »