News & Blog

Employees working remotely from home or on the road might be necessary for your organization at this time. Are your IT systems prepared? At Concensus, we have had remote employees from the first day we opened our doors in 2006. All of the software that we use to run our business is cloud-based.  In fact, we do not have any production...

Learn More

If you use Gmail for personal email, we have a trick that can help you not only organize your inbox but also help protect you against a cyber-breach. Gmail has the ability for you to add in periods anywhere in the first part of your email address. For example, jane.doe@gmail.com can be j.anedoe@gmail.com. You can also add a plus sign...

Learn More

The world can be a scary place, and the internet is no different. In recent years, more and more people are becoming aware of what’s known as the dark web—an underground and unregulated corner of the internet that holds a host of malicious, illegal, or otherwise disturbing online activities. Understanding what the dark web is, is essential to protecting your...

Learn More
CTech_MFA Part2

Multi-Factor Authentication is one of the most secure cyber solutions available to organizations, applications, and users today. Some applications require MFA in order to access features and services, and many more offer it as an additional security option that users can choose to enable.   There are a variety of ways to implement MFA through popular applications that work for personal...

Learn More
Multi-Factor Authentication

It's hard to create a unique password, let alone remember what password matches up with which account or website. Sometimes, it's just easier to type in "123456" or "password"...two of the top five most commonly used and hacked passwords of 2019. With 63% of all breaches resulting from weak, default, or stolen passwords, even complex passwords aren't enough to stop today's sophisticated...

Learn More
Concensus_ZENworks2020

ZENworks 2020 was released by Micro Focus in late 2019 and customers are upgrading in increasing numbers. The release plays well into the three core competencies of ZENworks: Managing the lifecycle of all endpointsSecuring endpoint devices against common vulnerabilitiesProtecting company data that lives on endpoint devices All of this runs on an increasingly powerful and well-organized single-pane-of-glass console. Security is...

Learn More
Cybersecurity Trends

In 2019, security and operation centers (SOCs) and IT security providers saw enormous growth in organizations needing cybersecurity solutions for detection and response to cybersecurity attacks and breaches, as well as managing overall privacy and user concerns. Cyberhackers are getting smarter and more strategic, and personal data is more at risk than ever. We know that security threats are not...

Learn More
Firewall

At Concensus, one of the most common questions we hear is about why organizations need firewalls, or why an organization should consider replacing or upgrading the firewall they currently have. Firewalls are an essential part of your network and critical to your organization's overall safety and security. The first step is understanding what a firewall is and what it does...

Learn More
Online Internet Security

Today I was going to sit down and write our latest blog about using multi-factor authentication & complete our monthly newsletter but then something caught my eye and I needed to get this out to everyone as soon as possible.  On Saturday January 4th 2020, The United States Homeland Security released a National Terrorism Advisory System Bulletin warning us of...

Learn More
DNS_Protection

DNS, or Domain Name System, essentially translates the names of websites into a registered IP address which allows your system to contact that site.  DNS acts like the phonebook for the internet.  DNS Protection Software is deployed on networks, end-user, and server systems to help prevent malware from being downloaded. When installed on laptops and mobile devices, it protects the...

Learn More