“Attackers don’t break in, they log in” - Luke Elston, Microsoft Practice Lead, CyberOne
In the digital-first era, identity security has become a critical focal point for organisations looking to secure their environments against ever-evolving cyber threats. This article draws on key insights from the recent CyberOne webinar Access Granted: The Identity Security Gap Exposing Modern Workplaces, which featured expert analysis by Luke Elston, Microsoft Practice Lead at CyberOne.
With the increasing sophistication and scale of attacks, identity-based security gaps pose a significant risk to operational resilience and data integrity. This article examines the current identity threat landscape, draws insights from recent industry data and explores practical strategies for organisations to enhance their identity security posture.
Microsoft's latest Digital Defence Report provides a sobering view of the modern threat landscape. The scale of attempted attacks is staggering: Microsoft observes over 600 million cyber attacks daily across its global infrastructure. Identity remains as a primary attack vector, with the platform blocking approximately 7,000 password-based attacks every second.
Even more concerning is that 99% of identity attacks are rooted in compromised passwords. This clearly illustrates the vulnerability of password-based authentication and underscores the urgency for organisations to move beyond traditional login mechanisms.
Despite these risks, only 41% of enterprise organisations have adopted Multi-Factor Authentication (MFA) according to the same report. MFA is one of the most effective tools available to counteract password-based threats, yet the adoption gap leaves most businesses exposed to preventable risks.
The "identity security gap" refers to the disconnect between the increasing reliance on digital identities in the workplace and the inadequate protections in place to secure them. As organisations transition to hybrid and remote work models, identity becomes the new perimeter. Users, devices and applications access corporate data from distributed environments often beyond traditional network controls.
This shift has outpaced many organisations' ability to adapt their security frameworks. Traditional security perimeters no longer suffice; attackers exploit this by targeting credentials and identity infrastructure to gain unauthorised access. The result is a heightened risk of credential phishing, account takeover and privilege escalation.
Microsoft's own data supports this. As Luke Elston noted during the webinar:
"Microsoft have said... they are on a mission to achieve 100% MFA adoption and currently... that is at 41% across enterprise organisations." — Luke Elston, Microsoft Practice Lead, CyberOne
Many of the challenges contributing to the identity security gap stem from weak governance practices and over-permissive access models. Common causes include:
Traditional security perimeters no longer suffice; attackers exploit this by targeting credentials and identity infrastructure to gain unauthorised access. The result is a heightened risk of credential phishing, account takeover and privilege escalation.
To address this, organisations need to evolve their security strategies to focus on identity as the foundational layer of defence.
Zero Trust is not a product but a strategic security model that assumes breach and enforces least-privilege access by verifying every request as though it originates from an open network. Within the context of identity, Zero Trust emphasises continuous verification of users and devices, adaptive access controls and real-time monitoring of user behaviour.
As organisations adopt Zero Trust, Microsoft Entra ID provides a strong foundation for securing digital identities. To operationalise this model effectively, here are five key recommendations that can significantly enhance your identity security posture:
This ensures timely provisioning and deprovisioning of user accounts and enables real-time updates for all joiner-mover-leaver scenarios, reducing risks from orphaned or over-permissioned accounts.
These steps help organisations implement Zero Trust principles in a practical, manageable way—leveraging existing Microsoft capabilities while addressing real-world identity security gaps.
For organisations looking to accelerate their Zero Trust journey, the following focus areas offer a practical roadmap. These actions, when implemented using Microsoft Entra ID, help enforce consistent access controls, reduce privilege sprawl and ensure continuous visibility into identity-related activity.
Focus Area |
Action |
1. MFA Enforcement |
Enforce Multi-Factor Authentication across all users and block legacy authentication protocols with no exceptions. |
2. Conditional Access |
Utilise Microsoft Entra’s built-in Conditional Access policy templates to define and enforce dynamic access rules. |
3. JIT Admin Privilege |
Implement Privileged Identity Management (PIM) for all privileged roles to enable Just-in-Time access and reduce standing permissions. |
4. External Access |
Utilise Access Packages and conduct regular access reviews with automatic expiration to manage access for suppliers, partners and vendors. |
5. Identity Monitoring |
Ingest Entra ID logs into your Security Operations Centre (SOC) to ensure 24x7x365 monitoring, detection and response capabilities. |
These five steps provide a structured and actionable approach to strengthening identity controls, leveraging capabilities already available within the Microsoft ecosystem. They complement broader Zero Trust strategies by focusing on proactive identity governance, adaptive access and continuous visibility.
Investing in identity security isn’t just about reducing cyber risk; it's also about protecting your personal information. It supports broader business objectives including:
The statistics speak for themselves. As password-based attacks continue to rise and the adoption of security basics like MFA remains limited, organisations must urgently address their identity security gaps. A Zero Trust approach built on secure identity foundations is no longer optional—it’s essential for modern cyber resilience.
With the right strategy and the smart use of Microsoft tools already at their disposal, organisations of all sizes can take meaningful steps to protect their identities, their data and ultimately their future.
One way to address the identity security gap is by adopting a managed identity solution that reduces internal complexity while maintaining strong protection. CyberOne’s Identity as a Service, powered by Microsoft Entra ID, supports Zero Trust principles by providing scalable access controls, robust authentication options such as MFA and passwordless login and continuous monitoring of user activity. Learn more about how this service can support your organisation's security posture at cyberone.security/services/identity-as-a-service.
Stay proactive in your security journey. Missed the webinar? Watch it on-demand to gain actionable insights and real-world strategies from our session on bridging the Identity Security Gap in Modern Workplaces.
Interested in tailored guidance? Book a free 1:1 consultation with a CyberOne expert to assess your current security posture and identify quick wins.