The Real Lesson from the Stryker Attack: The Weak Point Was Access, Not Software
Some of the most damaging cyberattacks stem from weak identity and access controls—not software flaws. For SMBs, poor oversight of high-level account access like Global Administrators is often the biggest threat. This blog outlines the steps you can take to reduce risk in your business.
The recent cyberattack on medical technology giant Stryker disrupted global operations and forced some of its locations to revert to manual workflows while systems were restored. Attackers reportedly gained elevated access to Stryker’s Microsoft environment and used Microsoft Intune—a legitimate endpoint management platform—to remotely wipe thousands of corporate devices at scale. No custom malware was required.
Unlike ransomware, which offers the possibility of recovery through backups or decryption, wiper attacks are designed to destroy data outright and disrupt businesses completely.
But while headlines often focus on what the hackers steal, there is a deeper lesson for business leaders. These incidents rarely succeed because of a single failure in software. They succeed when identity, access, and monitoring controls break down together.
For small and mid-sized businesses relying heavily on cloud services like Microsoft 365, the biggest risk often isn’t the platform itself, it’s how access to powerful administrative accounts is managed.
The Hidden Risk: Overpowered Admin Accounts
Many organizations unknowingly create a dangerous situation by assigning highly privileged roles—such as Global Administrator—to everyday user accounts.
This creates a single point of catastrophic failure.
If that account is compromised—through phishing, credential theft, or malware—an attacker could:
- Reset user passwords
- Disable security tools
- Grant themselves additional privileges
- Push malicious policies
- Or even wipe devices across the environment
In other words, the attacker doesn’t need a sophisticated exploit if they already have the keys to the kingdom.
The most resilient organizations recognize this risk and implement strong protections around privileged access.
Eight Building Blocks of a Resilient Security Strategy
A strong security posture is only as strong as its weakest link. Protecting your organization requires multiple safeguards working together to prevent, detect, and respond to threats.
Here are eight of the best security practices to help shore up those links—reducing risk, protecting critical systems, and helping your business respond quickly to attacks.
1. Defense-in-Depth: Layers and More Layers
A strong cybersecurity architecture is built on multiple overlapping layers of security rather than a single defensive measure.
Think of Defense in Depth as locking the front door, installing cameras, and setting an alarm rather than relying on just one lock.
If an attacker bypasses one layer—such as phishing a user—additional controls can still stop an attacker from accessing critical systems.
For example, blocking legacy authentication protocols like Basic Auth eliminates an entire class of credential stuffing attacks that can bypass MFA entirely—a single configuration change with outsized security impact.
2. Conditional Access Enforcement: Blocking Suspicious Behavior
Conditional Access adds intelligence to authentication decisions by evaluating the context of every login attempt.
Companies can restrict or challenge based on factors such as:
- Geographic location
- Device security posture
- Risk signals
- Sign-in behavior
This helps ensure suspicious login attempts from unknown devices or unusual locations are blocked before access is granted.
3. Multi-Factor Authentication (MFA): One Password Isn’t Enough
Credential theft remains one of the most common attack methods used by cybercriminals.
Multi-Factor Authentication significantly reduces this risk by requiring a second form of verification beyond a password.
Even if an attacker steals credentials, they still cannot access the account without the second factor.
For administrative accounts, MFA is absolutely essential.
4. Where the Stakes Are Highest: Privileged Access
This is one of the most important protections—and one of the most frequently overlooked.
As mentioned above, privileged roles like Global Administrator should never be tied to a normal user account.
Instead, organizations should:
- Assign privileged roles only to dedicated administrative accounts
- Use those accounts only when administrative work is required
- Enforce stronger security policies on privileged accounts
- Limit the number of Global Administrators to the absolute minimum
This significantly reduces the risk that a compromised user account could lead to full control of the environment.
In cybersecurity terms, this principle is known as least privilege.
In business terms, it simply means no one should have more power than they need.
The Stryker incident illustrates exactly what’s at stake. By gaining Global Administrator-level access to the company’s Microsoft environment, the attackers were able wipe thousands of phones and laptops simultaneously. Microsoft Intune worked exactly as designed. The problem was that attackers had access to it.
5. Catching Threats Early: Identity Threat Detection and Response (ITDR)
Modern security tools can now continuously identity activity to detect threats in real time. These ITDR tools continuously monitor login behavior, flag anomalies, and alert security teams before an attacker can move laterally through your environment.
These systems can detect indicators such as:
- Suspicious login attempts
- Impossible travel patterns
- Privilege escalation
- Unusual authentication behavior
When detected early, these signals allow security teams to respond before attackers can escalate their access.
6. Securing Devices Where Attacks Start: Endpoint Protection and Monitoring
Even with strong identity protections, endpoints remain a common attack surface.
Enterprise-grade endpoint security helps detect and contain malicious activity on managed devices.
This includes identifying:
- Malware execution
- Suspicious processes
- Unauthorized changes to system configurations
Endpoint monitoring acts as another layer in the security stack—protecting devices even if credentials are compromised.
7. Strengthening Security Using Best Practices and Proven Standards
Microsoft provides recommended security baselines and configuration standards designed to strengthen tenant security such as:
- Secure authentication settings
- Restricted legacy protocols
- Proper logging and auditing
- Privilege limitations
Following these standards ensures organizations benefit from proven security frameworks rather than ad hoc configurations.
8. Always Watching: Continuous Monitoring and Response
Cybersecurity isn’t a one-time configuration—it requires ongoing monitoring and rapid response.
Security alerts, login activity, and identity changes must be continuously reviewed so suspicious behavior can be investigated immediately.
Fast detection and response often determine whether a security event becomes a minor incident or a major disruption.
How Uprise Keeps Our Clients Secure
These security best practices aren’t just theory—they’re the approach we use at Uprise Partners to help protect our clients every day. Our team specializes in strengthening identity security, limiting high-risk access, and continuously monitoring for threats.
Taken together, these key approaches allow our clients to focus on their business while we handle the complexities of their operational security:
- Defense-in-depth security architecture to ensure multiple security layers to protect across systems
- Conditional access policies that evaluate sign-in risk, device posture, and location before granting access
- Multi-factor authentication enforcement across environments, with stronger controls for privileged accounts
- Strict privileged access management, ensuring Global Administrator and other high-risk roles are restricted
- Identity threat detection and response to detect suspicious sign-ins and privilege changes
- Enterprise-grade endpoint protection and monitoring across the client devices we manage
- Implementation of proven security baselines and best practices configurations
- Continuous monitoring and rapid response to mitigate suspicious activity
Incidents like the Stryker attack are a reminder that the most damaging breaches don’t always involve sophisticated exploits. For many organizations, tightening control over privileged accounts, particularly Global Administrator roles, may be the single most impactful security improvement they can make. When that access is properly restricted, the blast radius of any compromise shrinks dramatically.
If you’re not sure how many Global Administrators exist in your environment—or how well they’re protected—that’s the right place to start. We can run a quick review of your privileged access configuration and show you exactly where your biggest risks are. Just reach out to the team at Uprise Partners—we’re here to help.


