Wednesday, May 6, 2026
1 p.m. ET / 10 a.m. PT
We are pleased to share that Certinet Systems is now part of Convergence Networks. Learn More.
We provide businesses like yours with IT support, proactive monitoring, and preventive maintenance.
Co-managed IT is a collaboration that works well for companies that want to keep in-house IT staff while also increasing IT capacity and specialized expertise.
We will design a customized IT helpdesk solution that meets your current business needs and scales with you as you grow.
We provide scalable, secure, and cost-effective network support that evolves with your growing business.
Providing organizations with comprehensive backup and disaster recovery solutions whether on premise or in the cloud.
Benefits from expert guidance, strategic planning and a proactive approach to IT management that drives success.
We provide cybersecurity solutions and support designed to protect your networks, assets and data while ensuring compliance with your industry regulations
We provide Zero Trust Security and Application Safeguarding to protect your environment from internal and external threats.
We provide services to assess your risk, strengthen your cybersecurity program and orient your team with solid procedures and training.
We provide the next generation of managed security services with a focus on real-time threat detection, threat hunting and active response.
We ensure your business becomes and stays compliant with all relevant regulations, safeguarding your organization’s sensitive data and reputation.
We provide ongoing services and one-time engagements to improved your cybersecurity and safeguard your critical data and assets.
Pen testing simulates a real-world cyberattack to uncover potential weaknesses before malicious actors can exploit them.
We take a holistic approach to ensuring your organization achieves and maintains compliance with Cybersecurity Maturity Model Certification (CMMC) standards.
We’ll craft customized, secure cloud solutions that meet your organization’s needs. From strategic planning to execution, our cloud migration services are designed to help your business attain smooth transitions.
We create and maintain secure, scalable and high-performing cloud environments that can be used to set yourself apart from the competition.
As a Microsoft Partner, Convergence Networks has access to exclusive training, products and tools to support our clients. We also offer tools and resources that are only available to Microsoft Partners.
We specialize in guiding businesses through cloud migrations and with leveraging Microsoft 365 benefits without technical obstacles.
We explore the specific advantages and potential challenges of adopting Microsoft Azure for your organization, help you understand how Azure fits into your overall business strategy and how it can be tailored to meet your distinct objectives.
Our team will partner with you to consolidate all your voice service needs into one place using a Microsoft Teams Phone system.
We provide the next generation of managed security services with a focus on real-time threat detection, threat hunting and active response.
Leverage the power of Microsoft 365 for modern and secure collaboration. Convergence Networks helps you unlock its full value through expert implementation, change management and tailored training programs that achieve results.
Modernize legacy applications for a faster, safer, more agile business. Our application modernization services are designed to reduce risk, accelerate business outcomes and create tools your team will want to use.
Stop wasting time on manual work. Let automation do the heavy lifting. We help you transition from manual to modern with secure, high-impact Business Process Automation (BPA) services.
Connect business-critical apps to improve security, visibility and operational control with cloud integration services. Our integration services turn disconnected apps into a secure, manageable, and unified system.
Improve connection, support employee growth and foster an inclusive culture with secure Microsoft employee engagement solutions. We help organizations support employees throughout their entire journey.
Unlock business success with our Data Analytics Services. Visualize trends and make smarter data-driven decisions. Identify trends, explore relationships in your data, and share information with your team with ease.
Transform how your team works with a secure, customized SharePoint solution built for Microsoft 365 and your business needs. Unlock the full potential of your business and 365 investment with expert SharePoint services.
We provide the next generation of managed security services with a focus on real-time threat detection, threat hunting and active response.
Our Copilot Factory delivers AI Copilots tailored to the unique needs of organizations. Discover new productivity and greater achievement.
Leverage secure AI adoption with expert-led deployment, training, policy guidance, and data protection. We help organizations adopt tools like Microsoft Copilot and other generative AI with strong data security protocols built-in.
You need an expert in your field. With over 20 years of experience in all areas of technology, we have your
We pulled together the most common business IT questions and provided some answers.
We are a security first IT services firm providing
We approach our clients with a focus on their business goals and requirements before recommending solutions to help achieve the desired outcomes. Learn more about what makes us unique.
Our core mission as a company is to help and empower people. We want to lend our time and resources to these organizations as way to give back and support all they do for our communities.
For years, multi factor authentication (MFA) has been positioned as the answer to account compromise. And while MFA is still important, it is no longer enough on its own.
Attackers have shifted their focus. They are no longer trying to break into networks. They are going after users and identities.
According to industry research, identity-based attacks now account for roughly 30% of all intrusions. That number continues to grow because cloud platforms like Microsoft 365 have removed the traditional network perimeter. Once an attacker controls an identity, they often do not need malware, exploits, or sophisticated tools. They simply sign in.
This is why identity protection has become one of the most important parts of modern cybersecurity.
Imagine one of your employees receives what looks like a normal Microsoft 365 sign-in alert. The page looks real, the branding is correct, and nothing about it feels unusual. They enter their credentials and complete MFA, then go back to their work without a second thought.
What they do not see is that the page was fake. The attacker does not just capture the password. They steal the active session itself. That means they do not need to sign in again. From the system’s point of view, they already are the user.
A few minutes later, that same account signs in from another country, then another location. Files start getting accessed, mailbox rules get created, invoices get redirected, and new applications get authorized. In many environments, basic safeguards like impossible travel detection or conditional access policies may flag or even block this activity. However, when attackers operate within the bounds of existing sessions, trusted locations, or incomplete policy coverage, this behaviour can still blend in as legitimate user activity unless identity monitoring is configured beyond baseline controls.
From the security system’s perspective, this is a real user doing real things. And that is exactly what makes modern identity attacks so dangerous.
If you think back to the scenario above, the problem was not that MFA failed outright. The employee followed a familiar sign-in flow and approved what appeared to him as a legitimate request. From their perspective, the experience matched what they had been trained to expect.
This is what makes modern attacks so uncomfortable. The mistake is not always carelessness. Attackers are very good at making the wrong action look normal.
In March 2025, Troy Hunt, the creator of Have I Been Pwned, publicly shared that he himself fell victim to a phishing attack. This is someone who has spent his career teaching people how to avoid these exact traps. Even experts can get caught at the wrong moment.
In the scenario above, the attacker was not trying to steal just a password. They were after the session token (an active logged-in session that does not require signing in again). Once that session was captured, MFA no longer mattered. As far as Microsoft 365 was concerned, the attacker was already a trusted user.
That is why so many breaches now happen in environments where MFA is already enabled everywhere. Nothing looks broken. Nothing looks obviously compromised. The attacker is simply using a valid session, and traditional security controls have very little reason to stop them.
ITDR, or Identity Threat Detection and Response, is a cybersecurity discipline focused on protecting user identities and identity systems from attack.
Instead of watching devices, ITDR watches how identities behave.
It detects and responds to threats like credential theft, token abuse, privilege misuse, and lateral movement. These are the types of attacks that often look legitimate on the surface and easily bypass traditional security controls.
An ITDR system monitors identity activity and infrastructure across the environment. It tracks logins, authentications, identity providers, access requests, and directories like Active Directory or Entra ID. It compares this activity to a normal baseline and flags meaningful deviations as threats.
Examples include:
This is not just alerting. Modern ITDR systems can automatically contain threats by disabling accounts, revoking sessions, and blocking further access while the incident is reviewed.
If you think back to the scenario earlier, the most dangerous part was not how the attacker got in, but how long they could stay in without being noticed. In identity-based attacks, time works against you. On average, it takes organisations about 181 days to identify a data breach and another 60 days to contain it. That is months of quiet access, exploration, and damage before the problem is fully under control.
This is where identity-focused monitoring changes the outcome. When unusual sign-in or access behaviour is detected quickly, action can happen immediately. Sessions can be cut off, accounts can be paused, and the window for damage becomes much smaller. That difference in response time is often what separates a contained incident from a major business disruption.
“In a world where attackers move in minutes, ‘alerting’ isn’t enough. Your defence has to be faster than a human can think.” — Glenn Kemp, Managing Partner at Convergence Networks
Organisations already use many security tools, and it is easy to assume identity risk is already covered somewhere in that mix. Systems like IAM (Identity and Access Management) are focused on managing who gets access and what they are allowed to do. PAM (Privileged Access Management) is designed to tightly control high privilege accounts. EDR (Endpoint Detection and Response) watches what happens on devices, and XDR (Extended Detection and Response) helps correlate signals across multiple security layers, often feeding into MDR (Managed Detection and Response) services for investigation and response. All of these play important roles. However, they rely on the signals they receive. None of them are built specifically to continuously assess whether a trusted identity is being used in a way that still makes sense in real time. That is the gap ITDR fills. It does not replace these tools or MDR. It strengthens them by providing dedicated visibility into identity behaviour, which is where many modern attacks now begin and often remain hidden.
DNS protection reduces how often users are exposed to dangerous destinations in the first place. It works at the earliest point in an attack by controlling where devices and users are allowed to connect on the internet. When someone clicks a phishing link, is redirected to a fake Microsoft 365 login page, or unknowingly follows a malicious URL, DNS protection can stop that connection before the page ever loads.
This matters because many identity-based attacks begin long before an account is compromised. They start with a moment of exposure. By preventing access to known malicious, deceptive, or high-risk domains, DNS protection removes a large portion of the attack surface that leads to stolen credentials and session tokens.
ITDR assumes that eventually something will get through and focuses on what happens next. It watches for signs that an identity is being misused and moves quickly to contain the situation before it turns into something larger. Together, DNS protection and ITDR address both sides of the problem. One reduces the chance of exposure, and the other limits the impact if an identity is ever compromised.
For a long time, security strategy was built around protecting networks and devices. In cloud-first environments, the real control point is the identity.
When someone can sign in, they do not need to break anything. They can simply use what is already there.
This is why identity has become such a high value target and why so many modern incidents look nothing like the breaches of the past. There is no obvious break in. There is just a trusted account doing things it should not be doing.
That shift is forcing organisations to rethink what real protection looks like. It is no longer just about keeping attackers out. It is about watching what happens after access is granted and being able to react fast when something no longer makes sense.
MFA is still an important layer, but it is no longer the finish line. As the scenarios in this article show, attackers are no longer trying to break in the old way. They are trying to sign in and blend in. When identities become the main target, security has to move beyond simply verifying a login and start paying attention to how access is being used after the fact.
In this reality, organizations need to focus on reducing exposure, detecting misuse, and responding fast enough that small mistakes do not turn into major incidents. That is exactly the gap ITDR and DNS filtering are designed to close.
To connect, please enter the 6-digit code given to you by your Network Administrator: