top of page



Team iKan
Nov 18, 20250 min read


Identity in the Cloud Series: Part 7 – External Users and B2B Collaboration
Collaboration doesn’t stop at your organization’s walls. Vendors, contractors, and partners often need access to files, Teams channels, and shared resources to keep business moving. But when that access isn’t managed properly, it becomes one of the easiest ways for attackers to get in. Microsoft Entra makes external collaboration secure by allowing you to invite external users while still maintaining full control over what they can see and do. You can apply the same Condition
Team iKan
Oct 24, 20251 min read


Identity in the Cloud Series: Part 6 – Multi-Factor and Passwordless Authentication Done Right
Passwords have been the foundation of authentication for decades, but they are also one of the weakest links in security. Between phishing, credential reuse, and password spraying attacks, relying on them alone is no longer enough. That’s why multi-factor authentication (MFA) has become a baseline for any secure organization. MFA adds a layer of verification to ensure that even if a password is stolen, attackers can’t gain access without the second factor. But MFA must be imp
Team iKan
Oct 21, 20251 min read


Identity in the Cloud Series: Part 5 – Identity Governance
Managing access might seem simple at first - until your organization starts growing. Suddenly, users have access to files, apps, and groups they no longer need. Contractors come and go, employees change roles, and old accounts remain active far too long. Without the right framework, identity management becomes reactive instead of secure. Microsoft Entra Identity Governance gives you the tools to take control of that sprawl. It helps ensure that the right people have the right
Team iKan
Oct 20, 20252 min read


Identity in the Cloud Series: Part 4 – Privileged Identity Management
Admin access is one of the biggest security risks in any organization. Attackers know that compromising a single privileged account can open the door to everything. That is why limiting and monitoring elevated access is critical. Microsoft Entra’s Privileged Identity Management (PIM) gives organizations control over who can activate admin roles, when they can use them, and for how long. Instead of leaving admin rights assigned permanently, PIM lets you make users eligible and
Team iKan
Oct 16, 20251 min read


Team iKan
Oct 14, 20250 min read


Identity in the Cloud Series: Part 2 – Conditional Access Basics
Strong authentication is a great start, but identity protection needs context. Conditional Access gives you that context by deciding when, where, and how users can access your data. It works by evaluating signals such as user location, device compliance, risk level, and the app being accessed. Based on those conditions, it can allow, block, or challenge the sign-in. For example, a user logging in from an unmanaged device or unfamiliar country might be required to complete MFA
Team iKan
Oct 13, 20251 min read


Identity in the Cloud Series: Part 1 – The New Perimeter
The way we secure businesses has changed. In the past, companies built strong firewalls and assumed anything inside the network was safe....
Team iKan
Oct 10, 20251 min read


Team iKan
Oct 6, 20250 min read


Microsoft 365 Modern Workplace Series: Part 4 – OneDrive vs SharePoint: Where to Store What
One of the most common questions we hear is, “Should I save this in OneDrive or SharePoint?” Both are part of Microsoft 365, both store...
Team iKan
Oct 3, 20252 min read


Team iKan
Oct 1, 20250 min read


Microsoft 365 Modern Workplace Series: Part 2 – SharePoint as a Modern Intranet
Every company needs a central place for information. Without it, employees waste time digging through emails, old chats, or multiple...
Team iKan
Sep 29, 20251 min read


Security Series: Part 7 – Post-Incident Response and Recovery
No matter how many protections you put in place, incidents will happen. Attackers evolve, mistakes occur, and sooner or later your...
Team iKan
Sep 19, 20252 min read


Security Series: Part 6 – Identity and Passwords
Attackers love weak identities. Passwords that never change, accounts without MFA, and shared logins are often the easiest way into an...
Team iKan
Sep 18, 20251 min read


Security Series: Part 5 – Shadow IT
Shadow IT is when employees use tools, apps, or services without IT’s knowledge or approval. It usually starts with good intentions -...
Team iKan
Sep 17, 20251 min read


Security Series: Part 4 – Insider Threats
When people think about cyberattacks, they often imagine anonymous hackers on the outside trying to break in. The truth is, some of the...
Team iKan
Sep 16, 20251 min read


Security Series: Part 3 – Device Compliance and Endpoint Management
Strong identity protections are critical, but they only go so far if the devices connecting to your tenant are not secure. Endpoints are...
Team iKan
Sep 15, 20252 min read


Security Series: Part 2 – Phishing and Email Attacks
Phishing remains one of the most common and successful ways attackers compromise organizations. Even with modern spam filters in place,...
Team iKan
Sep 12, 20251 min read


Security Series: Part 1 – Handling Risky Users
Even with the best defenses in place, incidents can still happen. That is the reality of modern IT. Microsoft 365 gives organizations...
Team iKan
Sep 10, 20252 min read


Finally, a Simple Way to Put Company Holidays on Every Calendar
Every IT team has heard the same story: “I showed up for work today and it was a holiday.” The problem is simple - Microsoft 365 doesn’t...
Team iKan
Sep 8, 20252 min read
bottom of page