Technology News & Blog

Risk Management and Assessment for Business

Migrating Group Policies to Azure Intune Policies

August 6, 2020

Most enterprise organizations have made foundational investments in Active Directory, leveraging Group Policy Objects (GPOs) to manage their environment securely. However, when making a move to cloud-based systems such as Microsoft Azure, many discover significant capability gaps. They want to utilize their already proven GPOs for both efficiency and consistency.  When organizations don’t have consistent…

security-plan-image

WHY DOES MY ORGANIZATION NEED A CYBERSECURITY RESPONSE PLAN?

July 30, 2020

Most businesses or organizations will experience a cybersecurity incident, perhaps in the form of a phishing attack, spam emails, or an internal employee accidentally releasing malware throughout the network. Regardless of the size or scope of the incident itself, your organization needs a plan of attack to get back to business as usual and ensure…

umbrella sign-over-network

Why is Cybersecurity Insurance Important?

July 28, 2020

When it comes to cybersecurity threats, every company is a potential target. There is growing uncertainty and concerns about the cybersecurity industry’s ability to protect its customers, from schools and universities to small businesses and mom-and-pop storefronts, as well as Fortune 500 companies. Before the global pandemic, cybersecurity insurers saw many claims. However, with abrupt…

hacker on computer

Cyber Hygiene: How Clean is Your Organization?

July 22, 2020

Cyber hygiene is a more elegant way to describe staying safe online. Unfortunately, no amount of software or hardware can protect your system from attempts of ransomware attacks, data breaches, and other threats 100% of the time. Fortunately, there are a few steps your school, business, or organization can take to stay safe online. How…

Concensus_OneDriveFeatuers_BlogImage

The latest OneDrive Features You Need to Know

July 16, 2020

Microsoft OneDrive’s newest features provide better collaboration, and productivity for all workers, whether they are working remotely, transitioning back to the office, or a mix of the two.  Here’s what you need to know about the latest round of OneDrive updates.  Collaboration is key.  OneDrive is making significant changes to increase usability and adoption to…

Our Conversation with Hamline University

July 14, 2020

“We wanted to build a relationship rather than just purchase services.” Concensus had the recent opportunity to chat with Anthony Schroeder, Director of Infrastructure Systems and Services at Hamline University. Located in the Twin Cities, Hamline University is Minnesota’s first university, home to 2,900 students and 500 faculty and staff members. Anthony talked to us…

Why Your Organization Needs Log Management

July 14, 2020

What is log management?  Most IT systems can generate log files, which contain information about an application’s performance and provide critical data to developers on what is not working correctly.  Logs also provide vital insights (Think: “who, what, where, and when) for investigating an organizational security breach or a targeted cyber attack. When logs are…

Concensus_PhishingForHumansBlog

Phishing for Humans (Your Business’s Weakest Link)

July 9, 2020

Cybersecurity is everyone’s responsibility. Unfortunately for businesses and organizations of all sizes, users are typically the weakest link when it comes to phishing attacks and scams.  Despite all of the anti-virus software and modern firewalls available, a perfectly patched computer system is still vulnerable to a cyber attack if the end-user isn’t able to recognize…

Concensus Vulnerability Scanning

Network Vulnerability Scanning and Why You Need it Now

July 6, 2020

How do I secure my network?  Securing your network is an essential endeavor, and it should be your top priority. Schools, businesses, and organizations of all sizes and across all industries are vulnerable to steadily increasing security risks that could compromise or steal critical data, jeopardize internal and external relationships, and derail operations to the…

Let us give you peace of mind

Leave it to our experts to keep your organization secure around the clock. Partner with us for trusted technology support.