MICROSOFT CHANGES TO M365 (O365) PRICING GO INTO EFFECT ON MARCH 1st, 2022
In late 2021, Microsoft announced changes to their per month subscription prices along with some new SKU’s for annual pricing. These new changes will go into effect on March 1st, 2022. Currently, most of our customers pay on a month-to-month basis. This is a monthly term subscription that allows cancellations or seat-count reductions each month. This is…
Explaining Cybersecurity Audits
Whether you are a small business or a large enterprise, you need more than the latest anti-virus to ensure that your company’s network is secure. A cybersecurity audit helps you create a complete picture of your security strategy. Concensus Technologies has seen firsthand how cybercrime has grown into one of the epidemics of modern times. …
We’ve gone virtual. Is it right for your business?
As of August 1st, 2021 Concensus has gone 100% virtual. We no longer have a full-fledged office. Our corporate address is a virtual address with an organization called Regus. Regus is a shared meeting space that offers small offices (we have one dedicated locked office room), workrooms/areas, and conference rooms. We have always been a…
Developing a Co-Managed IaM Program – with Identity Automation
If you were unable to attend the “Developing a Co-Managed IaM Program” webinar with Identity Automation and Concensus, read below to learn more and view the webinar. Concensus has been doing co-managed Identity and Access Management implementations and programs for over 15 years in the higher education space and in k12. Our primary engineer program…
What is Stopping You From Changing IT Providers? Choosing the right provider with the right solution.
What’s Stopping you from Changing IT Providers – Introduction What’s Stopping you from Changing IT Providers – Getting Started What’s Stopping you from Changing IT Providers – Evaluating Proposals In blog 4 of this four-part series, we are going to explore how to choose the right provider to meet your requirements. What we’ve already covered…
IDENTITY AUTOMATION – IDENTITY BRIDGE
The Identity Bridge feature in RapidIdentity creates a secure network connection from the Cloud IDaaS tenant to your on-premise services such as a database or AD. To do this, you will need to set up agents that communicate with the IDaaS infrastructure to host and manage one or more bridges. An agent may have multiple…
Microsoft Exchange Vulnerabilities You Need to Know
Are you running Microsoft Exchange server? Have you installed the latest update for Microsoft Exchange kb5000871? According to the Microsoft Threat Intelligence Center (MSTIC), the Hafnium group, a state-sponsored group operating out of China, is likely behind the rash of exploits of four newly announced vulnerabilities. An exploit of these vulnerabilities could be used to:…
How to Write an Effective Support Ticket
We’ve all been there–we sit down at our workstation on a Monday morning, ready to get our week started. Then, we power on our computer and something goes wrong. Whether it’s not being able to open your email or another application not allowing you to print, unexpected issues that hold you back from getting your…
What is Stopping You from Changing IT Providers? – Evaluating Proposals
In this article we build upon the first two articles on “What is stopping you from changing IT providers?” and dive into the types of proposals. Types of proposals If you invite 10 companies, you are going to get about 3 different proposal types with a wide variety of options. They will differ mainly in…
Let us give you peace of mind
Leave it to our experts to keep your organization secure around the clock. Partner with us for trusted technology support.