Security Operations Center (SOC) Monitoring

Security Operations Center (SOC) Monitoring

The Security Operations Center (SOC) is an integral part of any network security infrastructure and its importance is only increasing in our increasingly interconnected world. This is especially true when it comes to the safety and security of the countless students, staff, and teachers at K-12 and higher education institutions all around the country. From…

Read More

Privileged Access Management

Privileged Access Management

As we navigate the digital world, it’s important to have secure access to the right data and applications at the right time. This is where Privileged Access Management (PAM) comes in. PAM is a security protocol that enables organizations to control and monitor access to sensitive data and applications, ensuring that only authorized users can…

Read More

The Gramm-Leach-Bliley Act (GLBA)

The Gramm-Leach-Bliley Act (GLBA)

As consumers grow to become more aware of the importance of protecting their personal and financial information, financial institutions must take measures to help safeguard this data. When you think of tech and education, you don’t normally think of things like data privacy, but it can play a huge role in the operations of K-12…

Read More

Cybersecurity: A Growing Concern in the Education Sector

Cybersecurity: A Growing Concern in the Education Sector

Probably the last thing educators or students anticipate when preparing for the school year is potential cyber threats. However, cyber threats have become increasingly common among schools and universities. It should come as no surprise that many schools and universities are now starting to take cybersecurity seriously, implementing multiple strategies and policies to enhance their…

Read More

Vulnerability Management: The Importance of Protecting Your School’s Network

Vulnerability Management: The Importance of Protecting Your School’s Network

Vulnerability management is a critical aspect of cybersecurity that involves identifying, prioritizing, and mitigating security vulnerabilities within an organization’s systems and networks. For schools, having a strong vulnerability management program in place is essential to protect sensitive student and staff data, maintain the integrity of educational systems, and prevent costly downtime. All the while, schools…

Read More

Single Sign-On: The Future of Education Technology Authentication

Single Sign-On: The Future of Education Technology Authentication

Technology is an important part of modern education, whether it’s the use of laptops in classrooms or the increased reliance on online education platforms. As the importance of technology in education further increases, so do the security needs of these schools, universities, and other educational institutions. This has led to the need to embed secure…

Read More

New Challenges in the Cybersecurity Insurance Market

Insurance Graphic

Cybersecurity insurance is an innovative concept for many small businesses, having only been created in the 1990s. It was initially developed to provide protection for bigger corporations including data processing errors and online media coverage. Since then, the policies for this type of liability insurance have been revised. Today’s cyber security policies provide financial coverage…

Read More

Happy Holidays – A Story of Gratitude

Thank you

As many of you know, I am in a peer group called Vistage.  Vistage has helped me grow in ways that I never thought was possible.  The speakers they have are all curated and great.  Last year at this time our retreat speaker was Bea Wray.  My wife and I had dinner with her the…

Read More

Insider Threats On the Rise!  Here is a Plan to Stop Them

October is National Cybersecurity Awareness Month.  Here at Concensus we believe in a multi-layered approach to ensure the protection of your most critical data.  This article will discuss one of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company…

Read More