The Role of Leadership in Cyber Awareness: How Business Leaders Can Set the Tone

In today’s digital landscape, investing in cutting-edge security software and hiring a skilled IT team is no longer sufficient to safeguard your business. A single misstep by an unsuspecting employee can lead to a costly breach that threatens your organization’s future. However, by fostering a security-first culture and empowering your workforce, you can transform your…

Read More

Why Upgrade to NetIQ Identity Manager 4.9?

In today’s fast-paced digital landscape, managing identities efficiently and securely is more critical than ever. NetIQ Identity Manager 4.9 brings a host of new features and enhancements designed to meet the evolving needs of businesses. Here are some compelling reasons why upgrading to this latest version is a smart move: 1. Enhanced Operating System Support…

Read More

Concensus Technologies Announces New Leadership Under Jaime Lowther as President

Concensus Technologies is excited to announce the promotion of Jaime Lowther from Chief Operating Officer to President. This strategic leadership transition reflects the company’s commitment to enhancing its capabilities in Identity and Access Management and Cybersecurity, areas that are increasingly vital in today’s digital landscape. A Vision for the Future Jaime Lowther, who has been…

Read More

5 Proven Ways to Mitigate the Cost of a Data Breach

Security Operations Center (SOC) Monitoring

No organization wants to suffer a data breach. But unfortunately, in today’s environment, it’s difficult to completely avoid them. Concensus Technologies assists with over a dozen security incidents every year. Approximately 83% of organizations have experienced more than one data breach. (IBM Security 2022 Cost of a Data Breach Report) These breaches hurt in many ways. First,…

Read More

New Challenges in the Cybersecurity Insurance Market

Insurance Graphic

Cybersecurity insurance is an innovative concept for many small businesses, having only been created in the 1990s. It was initially developed to provide protection for bigger corporations including data processing errors and online media coverage. Since then, the policies for this type of liability insurance have been revised. Today’s cyber security policies provide financial coverage…

Read More

Happy Holidays – A Story of Gratitude

Thank you

As many of you know, I am in a peer group called Vistage.  Vistage has helped me grow in ways that I never thought was possible.  The speakers they have are all curated and great.  Last year at this time our retreat speaker was Bea Wray.  My wife and I had dinner with her the…

Read More

Insider Threats On the Rise!  Here is a Plan to Stop Them

October is National Cybersecurity Awareness Month.  Here at Concensus we believe in a multi-layered approach to ensure the protection of your most critical data.  This article will discuss one of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company…

Read More

How Do I Know My Data Is Secure?

Laptop

Cybersecurity is a critical component in the protection of computer systems, networks and access to information security.  The apps we use on our phones and the many services we share our email with to sign up for subscriptions are examples of targets for criminals. Putting your information only into trusted sources is always a good…

Read More

What is Identity and Access Management Technology?

Graphic

There is a serious vulnerability that is caused by excessive user privilege. Identity and Access Management systems provide a valuable way to mitigate the threat and keep you secure. Identity and Access Management (IAM) systems are a way to electronically identify users and manage their access permissions automatically. IAM systems can be used to onboard,…

Read More

3 Big Challenges with the Internet of Things (IoT)

Internet of Things

IoT devices are continually popular within both the workplace and the home. Developments in technology behind things like speakers, TV’s, doorbells, appliances and even cars are moving to a much more automated and connected world. While these advancements are making strides for accessibility and convenience of consumers, it is important to also consider the security…

Read More