Back to Insights
Compliance & GovernanceAugust 2018

Passwords are still the weak link, and identity deserves more budget: Why Identity Keeps Moving to the Center

Identity has become the control plane for modern IT. Once users, devices, and cloud apps are linked through centralized identity, access decisions become more consistent and more defensible. When identity is fragmented,…

Category
Compliance & Governance
Month
August 2018

Practical guidance for leaders evaluating security, resilience, modernization, and AI-related technology decisions.

August 2018 is shaping up to be a month when passwords are still the weak link, and identity deserves more budget moves from background chatter to an active business decision. For many organizations, the real issue is not whether the headline is large enough to notice. It is whether existing systems, policies, and support models are ready for the kind of pressure this moment puts on them. Buyers looking at managed services, cloud modernization, or security support are asking the same practical questions: what changed, what is exposed, and what needs attention first.

Why identity is at the center

Identity has become the control plane for modern IT. Once users, devices, and cloud apps are linked through centralized identity, access decisions become more consistent and more defensible. When identity is fragmented, almost every other control gets harder to enforce.

identity security for SMB is valuable because it improves more than security. Stronger identity practices reduce help desk friction, clarify access ownership, support cloud adoption, and make compliance evidence easier to collect. In other words, identity work often looks like a security project but behaves like an operational upgrade.

Decision-makers should ask whether identity policies still reflect the way the business actually works. Mergers, turnover, remote work, cloud app growth, and rushed exceptions often leave behind access models that no longer make sense. Identity projects are most valuable when they correct those patterns, not when they simply add one more prompt at login.

This month should also trigger a review of exception culture. Temporary access often becomes permanent, and one-off admin rights rarely disappear on their own. Identity projects succeed when they clean up old exceptions while introducing better standards for new access.

What this means for access and risk

This is also a good time to simplify. Too many businesses carry legacy authentication methods or one-off exceptions because no one has owned the cleanup. A focused identity review can remove those weak points before attackers or auditors discover them first.

User communication should not be neglected. Stronger authentication and cleaner access rules succeed when people understand why the change is happening and what support looks like if something fails or needs an exception.

A common mistake is to apply stronger authentication without cleaning up the access model underneath it. MFA is powerful, but it does not solve stale group membership, standing admin rights, or vague ownership. Identity modernization has to include those quieter problems too.

Practical identity work to prioritize

For decision-makers, the practical move in August 2018 is to convert passwords are still the weak link, and identity deserves more budget into a short execution list. Identify the business systems or teams most affected. Clarify the control owner. Decide what must be done in the next 30 days, what belongs in the next quarter, and what should become part of steady-state managed service. That framing keeps the response grounded in operations rather than in headline fatigue.

This is where an MSP or IT consulting partner earns their keep. A good provider does more than install software or forward advisories. They inventory the environment, prioritize the risks, coordinate vendor guidance, translate technical changes into business decisions, and stay involved long enough to make the response stick.

A good engagement here usually starts with assessment and prioritization, not with a giant transformation pitch. Buyers need a partner who can identify the exposures, explain the tradeoffs in plain language, and map the work to realistic milestones. That could mean a security review, a licensing and migration workshop, a permissions cleanup, a backup test, or a phased modernization plan. The point is to make the next move concrete.

What good execution looks like

What good looks like is identity that feels intentional. Users have the access they need, risky access paths are narrowed, exceptions are documented, and authentication standards are consistent across the environment.

Identity improvements often unlock benefits well beyond login security. They reduce confusion, tighten process ownership, and support almost every modern cloud initiative.

Identity work rarely gets applause, but it frequently unlocks the cleanest gains in security, supportability, and cloud readiness.

Conclusion

Passwords are still the weak link, and identity deserves more budget is the sort of moment that separates reactive IT from managed IT. Businesses do not need drama. They need clarity, prioritization, and execution. The organizations that respond well in August 2018 will be the ones that treat this issue as part of operations, not as a temporary interruption.

Frequently asked questions

Common leadership questions around this topic.

Why is identity getting so much attention?

Because cloud apps, remote work, and modern security models all depend on reliable identity and access controls.

What is the first identity improvement most businesses should make?

Consistent MFA with role-based access review is usually the fastest way to reduce risk without slowing the business too much.