top of page



Meraki in the Modern Network: Part 5 – MV Smart Cameras
A secure network doesn’t stop at firewalls and switches. Physical security is just as important, and Meraki brings that same cloud simplicity to your cameras. Meraki MV smart cameras turn video security into part of your connected ecosystem. Each camera records, stores, and analyzes footage locally, while the cloud dashboard handles management, access, and analytics. No NVRs, no complicated wiring, and no manual backups - just reliable, secure video that’s easy to deploy and
Team iKan
Nov 5, 20251 min read


Meraki in the Modern Network: Part 2 – MX Security & SD-WAN
Every network starts at the edge - where users connect and threats try to get in. That’s why the Meraki MX is more than just a firewall. It’s a unified security and connectivity platform that brings visibility, control, and protection to every site in your network. The Meraki MX combines enterprise-grade security with cloud-managed simplicity. From the Meraki Dashboard, you can configure site-to-site VPNs, deploy SD-WAN policies, and enforce content filtering without needing
Team iKan
Oct 29, 20251 min read


Identity in the Cloud Series: Part 7 – External Users and B2B Collaboration
Collaboration doesn’t stop at your organization’s walls. Vendors, contractors, and partners often need access to files, Teams channels, and shared resources to keep business moving. But when that access isn’t managed properly, it becomes one of the easiest ways for attackers to get in. Microsoft Entra makes external collaboration secure by allowing you to invite external users while still maintaining full control over what they can see and do. You can apply the same Condition
Team iKan
Oct 24, 20251 min read


Identity in the Cloud Series: Part 6 – Multi-Factor and Passwordless Authentication Done Right
Passwords have been the foundation of authentication for decades, but they are also one of the weakest links in security. Between phishing, credential reuse, and password spraying attacks, relying on them alone is no longer enough. That’s why multi-factor authentication (MFA) has become a baseline for any secure organization. MFA adds a layer of verification to ensure that even if a password is stolen, attackers can’t gain access without the second factor. But MFA must be imp
Team iKan
Oct 21, 20251 min read


Identity in the Cloud Series: Part 4 – Privileged Identity Management
Admin access is one of the biggest security risks in any organization. Attackers know that compromising a single privileged account can open the door to everything. That is why limiting and monitoring elevated access is critical. Microsoft Entra’s Privileged Identity Management (PIM) gives organizations control over who can activate admin roles, when they can use them, and for how long. Instead of leaving admin rights assigned permanently, PIM lets you make users eligible and
Team iKan
Oct 16, 20251 min read


Team iKan
Oct 14, 20250 min read


Identity in the Cloud Series: Part 2 – Conditional Access Basics
Strong authentication is a great start, but identity protection needs context. Conditional Access gives you that context by deciding when, where, and how users can access your data. It works by evaluating signals such as user location, device compliance, risk level, and the app being accessed. Based on those conditions, it can allow, block, or challenge the sign-in. For example, a user logging in from an unmanaged device or unfamiliar country might be required to complete MFA
Team iKan
Oct 13, 20251 min read


Identity in the Cloud Series: Part 1 – The New Perimeter
The way we secure businesses has changed. In the past, companies built strong firewalls and assumed anything inside the network was safe....
Team iKan
Oct 10, 20251 min read


Security Series: Part 7 – Post-Incident Response and Recovery
No matter how many protections you put in place, incidents will happen. Attackers evolve, mistakes occur, and sooner or later your...
Team iKan
Sep 19, 20252 min read


Security Series: Part 6 – Identity and Passwords
Attackers love weak identities. Passwords that never change, accounts without MFA, and shared logins are often the easiest way into an...
Team iKan
Sep 18, 20251 min read


Security Series: Part 5 – Shadow IT
Shadow IT is when employees use tools, apps, or services without IT’s knowledge or approval. It usually starts with good intentions -...
Team iKan
Sep 17, 20251 min read


Security Series: Part 4 – Insider Threats
When people think about cyberattacks, they often imagine anonymous hackers on the outside trying to break in. The truth is, some of the...
Team iKan
Sep 16, 20251 min read


Security Series: Part 3 – Device Compliance and Endpoint Management
Strong identity protections are critical, but they only go so far if the devices connecting to your tenant are not secure. Endpoints are...
Team iKan
Sep 15, 20252 min read


Security Series: Part 2 – Phishing and Email Attacks
Phishing remains one of the most common and successful ways attackers compromise organizations. Even with modern spam filters in place,...
Team iKan
Sep 12, 20251 min read


Security Series: Part 1 – Handling Risky Users
Even with the best defenses in place, incidents can still happen. That is the reality of modern IT. Microsoft 365 gives organizations...
Team iKan
Sep 10, 20252 min read


The Easier Way to Handle Local Admin Rights
One of the biggest security gaps in IT environments comes from users running as local administrators on their devices. To solve this,...
Team iKan
Sep 9, 20252 min read


When Hackers Push Harder, Your Security Needs to Push Back
In our last post, we talked about how Entra ID P2 protects your business with risk-based policies that automatically detect and respond...
Team iKan
Sep 6, 20252 min read


Weekends: When Companies Rest, Hackers Go Into Overdrive
Weekends are a time to recharge. Email slows down, meetings disappear, and most employees are out of office. But for cybercriminals,...
Team iKan
Sep 6, 20252 min read


Protecting Your Business with Conditional Access in Microsoft Entra ID
Running a business today means balancing convenience for your team with protection against cyber threats. Microsoft Entra ID has a...
Team iKan
Sep 5, 20252 min read
bottom of page