Get in touch

Today’s cyber criminals have found something far easier than hacking through your defences—they’re stealing the keys and opening the gates. 

The security playing field has changed. Your network perimeter isn't what it used to be—it's dissolved, replaced by something far more fluid and harder to secure. Today, identity has become the new battleground. 

In security terms, an identity is anything that can authenticate to your systems—employee accounts, admin credentials, service accounts, API keys, and even machine identities that your applications use to talk to each other. Each one is a potential key to your kingdom. 

Let’s take a look at why this matters, and how to protect your business. 

Why is identity such a potent threat vector?

An identity-based attack begins not with exploiting a technical vulnerability, but with compromising the digital identity of someone or something with legitimate access to your systems. These are the shadows lurking within your organisation's access framework—the credentials, accounts, and permissions that define who can reach what, when, and how.

The statistics tell an interesting story; one survey found that 93% of organisations have experienced two or more breaches due to identity-related cyberattacks, with 99% of affected organisations suffering negative business impacts. This isn't a theoretical threat; it's the reality for nearly every business. 

Identity has become the new security perimeter in our interconnected world. When your workforce accesses company resources from anywhere, traditional network boundaries dissolve, leaving identities as the primary control point between your data and those who seek it. 

93% of organisations have experienced two or more breaches due to identity-related cyberattacks

How does an identity-based attack work?

 

Let's walk through a typical scenario: 

Sarah, a finance director at a mid-sized manufacturing firm, receives an email that appears to be from Microsoft, warning that her account access will expire unless she verifies her credentials. The email looks legit—it has the right logo, formatting, and a professional tone. Concerned about losing access during month-end closing, she clicks the link and enters her username and password on the convincing-looking login page. 

What Sarah doesn't realise is that she's just handed her credentials to an attacker. 

Within hours, the attacker logs into her Microsoft 365 account from an unrecognised location. The company's security tools don't flag this because it looks like a legitimate login—correct username, correct password. The attacker begins by setting up email forwarding rules to receive copies of Sarah's financial communications and to hide any security alerts that might be sent to her.
 

Over the next three weeks, the attacker:

  • Maps the network by accessing SharePoint sites and Teams channels 
  • Identifies the finance system from calendar invites and emails 
  • Discovers Sarah has approved-user access to the payment platform 
  • Uses her existing sessions to navigate between connected systems 
  • Eventually initiates several fraudulent payments to overseas accounts 

When the fraud is finally discovered during reconciliation, the company faces a multi-layered nightmare: 

  • £480,000 in fraudulent transfers, only partially recoverable 
  • Every system Sarah accessed must be considered compromised 
  • All her passwords need immediate reset, disrupting month-end processes 
  • IT have to comb through weeks of logs across multiple platforms to track the attacker's movements 
  • The entire Microsoft 365 environment requires security review and hardening 
  • The company must notify clients whose data may have been exposed 
  • Third-party forensic experts and legal counsel must be engaged 

What looked like a single compromised account ended up costing hundreds of thousands in direct losses, remediation costs, and lost productivity—all because one identity was compromised. 

How Sarah's company could have prevented this 

This attack wasn't Sarah's fault—it exploited normal human behaviour and trust. Several key safeguards could have stopped this attack at multiple stages, though: 

Multi-factor authentication

would have prevented the attacker from accessing Sarah's account, even with her password 

Anomaly detection

could have flagged the login from an unusual location and device 

Conditional access policies

could have restricted what actions can be performed from unrecognised devices 

Session monitoring

would have identified unusual patterns of access across multiple systems 

Just-in-time access

for financial systems would have required additional verification before payment approval 

Security awareness training

would have helped Sarah recognise the phishing attempt, giving her the confidence to verify suspicious communications through official channels 

None of these controls blame or burden Sarah—they simply add invisible guardrails that protect identities and catch attackers when credentials are compromised. 

Why traditional security approaches fall short 

Conventional security has long focused on creating stronger walls—better firewalls, more secure endpoints, intrusion detection systems. But these tools struggle to detect what appears legitimate. If an attacker uses valid credentials, how does your security system recognise the threat? 

This is why identity-based breaches are particularly dangerous. The average time to detect an identity-based breach is 168 days—nearly six months during which attackers can conduct reconnaissance, compromise accounts, and extract data. That's half a year of someone exploring your network and accessing your sensitive information. They’re planting seeds in your garden without you noticing. 

Traditional approaches fail here because they're designed to spot abnormal entry points, not abnormal behaviour from trusted sources. When the attack looks like business as usual, conventional security is effectively blind. 

The average time to detect an identity-based breach is 168 days

We reveal unseen threats in your environment before they impact your business. Speak with our security experts today.

Get started

If you're currently experiencing a breach, reach out to our team

0800 644 2424