News & Blog

cybersecurity audit

Explaining Cybersecurity Audits

| November 16, 2021

Whether you are a small business or a large enterprise, you need more than the latest anti-virus to ensure that your company's network is secure. A cybersecurity audit helps you create a complete picture of your security strategy.   Concensus Technologies has seen firsthand how cybercrime has grown into one of the epidemics of modern times.   In 2020 We saw a...

Learn More
working remotely with cat on lap

As of August 1st, 2021 Concensus has gone 100% virtual.  We no longer have a full-fledged office.  Our corporate address is a virtual address with an organization called Regus.  Regus is a shared meeting space that offers small offices (we have one dedicated locked office room), workrooms/areas, and conference rooms. We have always been a hybrid company.  We have employees...

Learn More
higher education teaching

If you were unable to attend the “Developing a Co-Managed IAM Program” webinar with Identity Automation and Concensus, read below to learn more and view the webinar. Concensus has been doing co-managed Identity and Access Management implementations and programs for over 15 years in the higher education space and in k12. Our primary engineer program is a market-leading solution where...

Learn More
it service provider

What’s Stopping you from Changing IT Providers - IntroductionWhat’s Stopping you from Changing IT Providers - Getting StartedWhat’s Stopping you from Changing IT Providers - Evaluating Proposals In blog 4 of this four-part series, we are going to explore how to choose the right provider to meet your requirements.  What we've already covered In the last blog (Evaluating Proposals), we...

Learn More
Businesswoman using digital x-ray human brain interface with cell and neurons activity 3D rendering

The Identity Bridge feature in RapidIdentity creates a secure network connection from the Cloud IDaaS tenant to your on-premise services such as a database or AD. To do this, you will need to set up agents that communicate with the IDaaS infrastructure to host and manage one or more bridges.   An agent may have multiple bridges. The architecture is as...

Learn More

Are you running Microsoft Exchange server? Have you installed the latest update for Microsoft Exchange kb5000871? According to the Microsoft Threat Intelligence Center (MSTIC), the Hafnium group, a state-sponsored group operating out of China, is likely behind the rash of exploits of four newly announced vulnerabilities. An exploit of these vulnerabilities could be used to: Create a web shell to...

Learn More
247 support ticket

We’ve all been there--we sit down at our workstation on a Monday morning, ready to get our week started.  Then, we power on our computer and something goes wrong.  Whether it’s not being able to open your email or another application not allowing you to print, unexpected issues that hold you back from getting your job done can pop up...

Learn More
Evaluating Proposals

In this article we build upon the first two articles on “What is stopping you from changing IT providers?”  and dive into the types of proposals. Types of proposals If you invite 10 companies, you are going to get about 3 different proposal types with a wide variety of options.  They will differ mainly in their approach to billing rather...

Learn More

Concensus is proud to offer patch management services on a quarterly or monthly basis. But before we get to that, let’s talk about what exactly patch management means, and how it can benefit your business. What is Patch Management? Patch management is the process of managing a network of computers by performing consistent patch deployment to keep all systems up-to-date....

Learn More
Data Privacy

Data Privacy Day 2021

| January 28, 2021

Today is Data Privacy Day.  This is an international effort to empower individuals and businesses to respect privacy, safeguard data and enable trust.  Better privacy starts with better security.  Here are a few tips to enhance your own privacy by using better security.  ENABLE MULTI-FACTOR AUTHENTICATION The best way to secure your online accounts is to enable multi-factor authentication on...

Learn More

Speak With A Technical Professional

  • This field is for validation purposes and should be left unchanged.