One of the best ways to avoid the problem of ‘shadow IT’ is building systems that are both highly secure and highly usable.