IDENTITY AUTOMATION – IDENTITY BRIDGE
The Identity Bridge feature in RapidIdentity creates a secure network connection from the Cloud IDaaS tenant to your on-premise services such as a database or AD. To do this, you will need to set up agents that communicate with the IDaaS infrastructure to host and manage one or more bridges. An agent may have multiple…
Microsoft Exchange Vulnerabilities You Need to Know
Are you running Microsoft Exchange server? Have you installed the latest update for Microsoft Exchange kb5000871? According to the Microsoft Threat Intelligence Center (MSTIC), the Hafnium group, a state-sponsored group operating out of China, is likely behind the rash of exploits of four newly announced vulnerabilities. An exploit of these vulnerabilities could be used to:…
How to Write an Effective Support Ticket
We’ve all been there–we sit down at our workstation on a Monday morning, ready to get our week started. Then, we power on our computer and something goes wrong. Whether it’s not being able to open your email or another application not allowing you to print, unexpected issues that hold you back from getting your…
What is Stopping You from Changing IT Providers? – Evaluating Proposals
In this article we build upon the first two articles on “What is stopping you from changing IT providers?” and dive into the types of proposals. Types of proposals If you invite 10 companies, you are going to get about 3 different proposal types with a wide variety of options. They will differ mainly in…
Understanding the Benefits of Patch Management
Concensus is proud to offer patch management services on a quarterly or monthly basis. But before we get to that, let’s talk about what exactly patch management means, and how it can benefit your business. What is Patch Management? Patch management is the process of managing a network of computers by performing consistent patch deployment…
Data Privacy Day 2021
Today is Data Privacy Day. This is an international effort to empower individuals and businesses to respect privacy, safeguard data and enable trust. Better privacy starts with better security. Here are a few tips to enhance your own privacy by using better security. ENABLE MULTI-FACTOR AUTHENTICATION The best way to secure your online accounts is…
What is Stopping you from Changing IT Providers? – GETTING STARTED
In our first blog post, we discussed why change is hard and why you need to formalize your process so that you can compare IT providers. This second blog in the series will focus on where to start. What is important? The absolute first thing you need to decide is what is important to you…
Developing a Cybersecurity Program Quickly and Efficiently
More organizations than not face many challenges when it comes to implementing a cybersecurity program. For instance, how do you create and manage an information program that must reduce risk but also demonstrate compliance to management and outside parties? How do you decipher and track compliance with regulations and frameworks such as NIST CSF, ISO…
What is Stopping you from Changing IT Providers – Intro
Change is Hard! Change is the only constant in the IT world. The products that we buy today that are suitable for our needs can become difficult to maintain, difficult to secure, and may lack modern features tomorrow. Every year and budget cycle we evaluate our software subscriptions, our leases, our telecommunications, our providers, and…
Let us give you peace of mind
Leave it to our experts to keep your organization secure around the clock. Partner with us for trusted technology support.