Tech Explainer
5 min read

The 20-50-100 Rule: The Three Moments AustralianBusinesses Break Their Own IT

Growth rarely breaks IT overnight. It shows up in friction, inconsistency, and decisions made outside the system just to keep the business moving
Published on
23th March 2026

There are three moments when a scaling Australian business quietly breaks its own IT.

Most leaders notice something has shifted. Systems feel less reliable. Onboarding takes longer. Small issues appear more often. But the cause is rarely obvious.

What is actually happening is structural.

As organisations grow,complexity increases faster than the underlying IT model evolves. Processesthat once relied on speed and familiarity begin to create friction when applied at scale. What worked for a team of twelve no longer holds at thirty, fifty, or a hundred.

The pattern is consistent. At approximately 20, 50, and 100 employees, the same types of breakdowns surface. Not because technology fails. Because the operating model has not keptpace with growth.

This is not a failure of ambition. It is a predictable consequence of it.

1. Around 20 Employees: When Informal IT Stops Scaling

At this stage, IT is informal by design. Devices are configured as needed, access is granted through direct requests, and knowledge lives in people rather than in documented process. Fora small team, this feels efficient because problems are solved fast and everyone knows who to ask.

The moment the business crosses the 20-employee mark which is the formal ABS boundary between "small" and "medium" business in Australia volume starts to matter in a wayit didn't before.

Every new hire becomes a small IT project. Configurations differ between users. When someone leaves, accessand institutional knowledge do not always transfer cleanly. The organisation is now paying three times for every onboarding: the new hire loses time, the manager loses confidence, and IT becomes a ticket factory.

"We're not sure what we have, who has access, or what's unsupported."

The data reflects how widespread this is. Ivanti's 2025 Digital Employee Experience research found that more than one in three organisations still rely on spreadsheets to track IT assets, exactly the failure mode scaling firms hit as configurations multiply and environments drift.

The fix at this stage is not more tools. It is structure. Onboarding and offboarding become defined processes. Device configurations are standardised. Identity and access move to central control. The goal is a repeatable environment that does not depend on specific individuals to hold it together.

2. Around 50 Employees: When Friction Becomes Visible

By the time an organisation approaches fifty employees, the effects of earlier decisions become impossible to ignore.

Issues are no longer isolated. They repeat. Users experience performance differences depending on where and how they work. Access requests take longer than expected. Teams begin to find their own ways around the delays adopting tools independently, using personal accounts, bypassing the official path entirely.

This is Shadow IT. And in 2026,it has evolved into something more consequential: Shadow AI.

"Teams keep buying tools on a credit card because the official path is too slow -- and now nobody knows where data lives."

Microsoft and LinkedIn's 2025Work Trend Index found that 78% of AI users bring their own AI tools to work and the behaviour is even more common in small and medium-sized organisations(80%). Netskope's 2026 Cloud and Threat Report puts the downstream consequence in concrete terms: the average organisation now sees 223 genAI-related data policy violation incidents per month.

These are not abstract risks. They are active exposures sitting inside businesses that believe their IT environment is under control.

The structural fix at this stage is coherence. Access through a central identity layer. Consistent policies across users and devices. Visibility across systems so that shadow tool adoption is caught early, not discovered during an incident.

When this alignment is introduced, the environment stabilises. Without it, friction and risk scales with headcount.

The moment your business grows is the moment your IT is tested | Inlight IT

3. Around 100 Employees: When IT becomes a Business Risk

Beyond this threshold, IT is no longer a background function. Downtime affects revenue directly. Security incidents carry financial, legal, and reputational consequences. Data moves across a wider set of systems, increasing exposure and complexity.

The infrastructure that once felt sufficient begins to show its limits. Inconsistent patching, fragmentedidentity management, unverified backups - these are no longer operational annoyances. They are material risks that scale their blast radius with headcount and system interdependence.

"We don't have an IT roadmap. We have an IT queue."

Australia's ACSC reported more than 1,700 proactive notifications to entities about potentially malicious activity in FY2025. Over 12% of those engagements were confirmed incidents.

At this stage, the organisation requires intentional design rather than incremental fixes. Security treated as a system, not a series of actions. Access governed centrally. Backup and recovery processes that are tested, not assumed. A forward-looking IT plan that is aligned to business growth, not assembled in response to the last incident.

4. Why This Happens: The Success Trap

These patterns are not the result of poor decisions. They are a natural consequence of growth.

The same approach that enables abusiness to move quickly in its early stages often becomes a constraint ascomplexity increases. Informal processes, flexible systems, and reactive support scale alongside the organisation amplifying both its strengths and its structural weaknesses.

This is what the research calls the "Success Trap": growth does not simply add volume. It compounds existing structures. The organisation becomes more complex fasterthan its operating model can evolve.

This is why many businesses reach a point where progress feels harder despite continued growth. Revenue is up. Headcount is growing. But every new hire, every new system, every new process adds friction rather than capability.

The trap is that the symptoms arrive gradually, then all at once.

5. The Cost of Waiting Too Long

Delayed modernisation rarely appears problematic at first. Systems continue to function. Issues are resolved as they arise. The cost is hidden.

Over time, it surfaces in three places:

  • Productivity loss from repeated interruptions, slow access, inconsistent tools, and onboarding drag
  • Security exposure from patching gaps, unmanaged shadow IT, and identity environments that have never been formally reviewed
  • AI and automation failure from underlying data problems that only become visible when a project tries to use them

On that last point: Gartner predicted that through 2026, organisations will abandon 60% of AI projects that are unsupported by AI-ready data. IBM's research ties poor data quality to material annual losses across thousands of organisations globally.

"60% of AI initiatives will be abandoned due to data unreadiness. The foundation was never built." ~ Gartner, 2026

By the time IT is recognised as a constraint on growth, it is usually already affecting performance, risk, and decision-making. The question is how long that has been true before anyone noticed.

6. A Practical Lens: Where to Look First

Improvement does not start with new technology. It starts with clarity.

Understanding how users areonboarded, how access is controlled, how devices are configured, and where data actually flows provides a clear picture of whether the environment can support further growth. In most cases, the underlying issue is not capability. It is alignment -- systems that have not evolved to match how the business now operates.

Four foundations are worth examining first:

Identity. Is there a single authoritative identity source? Are MFA and SSO applied consistently? Can offboarding be completed cleanly?

Device lifecycle. Are devices procured, configured, and patched to a documented standard? Is provisioning repeatable or manual?

Security baseline. Has the organisation assessed against the ACSC Essential Eight? Is there documented evidence of controls, or are there best-effort assumptions?

Data and AI governance. Are data flows mapped? Is AI tool usage governed, or is it accumulating risk unmonitored?

In most organisations at the 20-100 employee stage, addressing these gaps creates immediate stability and sets the foundation for further growth.

7. Next Steps

Outgrowing IT is not a failure.It is a growth stage.

Organisations that navigate it effectively recognise the shift early and adjust their operating model before friction compounds. They move from reactive support to intentional platform building and when they do, growth becomes measurably easier. Onboarding is faster. Risk is controlled. Systems support the business rather than slow it down.

Inlight IT works with Australian organisations to assess their current environment and implement practical, architecture-led improvements aligned to their stage of growth. If your IT feels like it is catching up rather than enabling, an assessment is the right place to start.


Ready to safeguard your business? Inlight IT can Help

Book a consultation with our engineers below or explore our Cloud, SD-WAN, Managed IT Services, HCI, Connectivity, and Security solutions

Newsletter
No spam. Just the latest releases and tips, interesting articles, and exclusive interviews in your inbox every week.
Read about our privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Latest Posts

Inlight IT Blog

Explore case studies, blogs, white papers, and tips on managed services, AI, and cloud innovation

Retail Tech Essentials for 2026: Build a Smarter, Faster, More Connected Store

Discover how forward-thinking retailers are transforming their stores in 2026 with smarter tech, stronger connectivity, and the kind of IT strategy that powers serious growth
Read post
Tech Explainer
8 min read

SD-WAN Explained: Benefits, Use Cases & Costs

Discover what SD-WAN is, how it works, and why it's transforming business networks across Australia
Read post
Tech Hotspot
8 min read

Why Microsoft HCI is the Smart Choice for Modern IT Infrastructure

From cost control to resilience, we analyse why more teams are making the switch to HCI
Read post
Request
A Quote
Contact Us
Book a Free Consultation