For years, cybersecurity conversations started with the firewall.
And to be clear, firewalls still matter. They help protect your network, control traffic, and reduce exposure. But the way people work has changed. Employees are no longer sitting behind one office network, using only company‑owned devices, and accessing only internal applications.
Today, your team logs in from home, client sites, cafés, airports, and mobile or personal devices. They rely on cloud services like Microsoft 365, Teams, SharePoint, SaaS platforms, AI tools, and remote access systems to do their jobs.
In that world, the real security perimeter is no longer just your office network.
It is your users and how they access your systems.
Attackers often don’t need to “break in” anymore. In many cases, they simply log in.
If an attacker can steal a password, trick a user into approving a sign‑in, or compromise an email account, they may gain access without triggering traditional security alarms.
That’s why identity security is now one of the most critical areas of modern IT security.
In Microsoft 365 environments, user accounts often provide access to email, shared mailboxes, SharePoint and OneDrive files, client data, financial information, cloud applications, and third-party platforms. When one account is compromised, the impact can escalate quickly.
We’ve seen situations where a single compromised mailbox led to invoice fraud attempts, internal phishing, password resets across multiple systems, and even lateral movement into administrative access.
Many SMBs still rely too heavily on passwords. The challenge is that passwords are reused, guessed, stolen and phished. Even a strong password becomes useless if it’s entered into a fake login page.
This is where multi‑factor authentication, or MFA becomes essential.
MFA dramatically reduces the risk of a stolen password turning into a successful compromise. But in practice, MFA is often:
MFA is an important first step, but it’s not a complete security strategy.
Another recurring issue we see during security reviews is over‑permissioned users.
As employees change roles or join projects, access is rarely cleaned up. Over time, permissions accumulate quietly, increasing risk. If one of these accounts is compromised, attackers gain far more access than necessary.
Applying the principle of least privilege means regularly reviewing:
Conditional Access is one of the most impactful identity security tools available to SMBs.
It shifts security from simply asking “who are you?” to asking:
Who are you, how are you logging in, from where, on what device, and under what conditions?
Instead of treating every login the same, Conditional Access allows you to apply rules based on user role, device status, location, sign-in behaviour, risk signals, and application sensitivity.
For example, you can:
Many organizations already have Conditional Access available, but it is often underused, misconfigured, or copied from generic templates.
When properly designed, it creates a security gate that adapts to users and risk without unnecessarily slowing down the business.
Conditional Access is powerful but works best when it is carefully designed around real users, real risks, and real business operations.
In our Conditional Access service projects, we help clients:
Identity security isn’t just an IT concern. It directly affects business continuity, operational risk, and client trust.
Weak identity controls can expose organisations to email compromise, ransomware, data leaks, and costly downtime.
The firewall still plays an important role but today how your users access your systems matters just as much.
At Present, we help SMBs strengthen identity security through:
Not sure where your biggest identity risks are hiding?
An Audit Flash can quickly identify gaps in security before they turn into real incidents.
The right use of technology addresses business challenges and drives business growth in all areas of an enterprise. We hope this blog will offer insight into developing strategies and tactics to enable you to identify those key drivers of growth and keep pace with and anticipate the rapid technology change of today.