News & Blog

umbrella sign-over-network

When it comes to cybersecurity threats, every company is a potential target. There is growing uncertainty and concerns about the cybersecurity industry's ability to protect its customers, from schools and universities to small businesses and mom-and-pop storefronts, as well as Fortune 500 companies. Before the global pandemic, cybersecurity insurers saw many claims. However, with abrupt changes in how and where...

Learn More
hacker on computer

Cyber hygiene is a more elegant way to describe staying safe online. Unfortunately, no amount of software or hardware can protect your system from attempts of ransomware attacks, data breaches, and other threats 100% of the time. Fortunately, there are a few steps your school, business, or organization can take to stay safe online. How to Practice Safe Cyber Hygiene...

Learn More
Concensus_OneDriveFeatuers_BlogImage

Microsoft OneDrive’s newest features provide better collaboration, and productivity for all workers, whether they are working remotely, transitioning back to the office, or a mix of the two.  Here’s what you need to know about the latest round of OneDrive updates.  Collaboration is key.  OneDrive is making significant changes to increase usability and adoption to enable teams to work better...

Learn More

“We wanted to build a relationship rather than just purchase services.” Concensus had the recent opportunity to chat with Anthony Schroeder, Director of Infrastructure Systems and Services at Hamline University. Located in the Twin Cities, Hamline University is Minnesota’s first university, home to 2,900 students and 500 faculty and staff members. Anthony talked to us about the partnership we’ve formed...

Learn More

What is log management?  Most IT systems can generate log files, which contain information about an application's performance and provide critical data to developers on what is not working correctly.  Logs also provide vital insights (Think: "who, what, where, and when) for investigating an organizational security breach or a targeted cyber attack. When logs are analyzed in real-time or near...

Learn More
Concensus_PhishingForHumansBlog

Cybersecurity is everyone's responsibility. Unfortunately for businesses and organizations of all sizes, users are typically the weakest link when it comes to phishing attacks and scams.  Despite all of the anti-virus software and modern firewalls available, a perfectly patched computer system is still vulnerable to a cyber attack if the end-user isn't able to recognize a security breach attempt. End-users...

Learn More
Concensus Vulnerability Scanning

How do I secure my network?  Securing your network is an essential endeavor, and it should be your top priority. Schools, businesses, and organizations of all sizes and across all industries are vulnerable to steadily increasing security risks that could compromise or steal critical data, jeopardize internal and external relationships, and derail operations to the point of no return. You...

Learn More

The digitization of K-12’s learning resources has gone from being a helpful instructional supplement to the core of the mandated at-home classroom. The applications leveraged by schools require roster data for each user to be able to use their services.  However, providing application vendors with the necessary information to deliver their services to the right students and teachers can be...

Learn More
Concensus Safeguarding

The immediate needs of securing a remote workforce are beginning to wind-down, but now companies need to plan for both short-term and long-term IT decisions. To make these IT decisions, companies first need to consider that much of their remote workforces are adapting to working from home, and many may need or want to remain working from home for the...

Learn More
CTech_DataEncryptionAndKeyManagement

At Concensus, we believe that partnerships provide the best options for our customers. We’ve recently partnered with Townsend Security, to provide critical key management and encryption services—not only for on-premise needs but also the ability to encrypt virtual machines hosted in Concensus Cloud. That's why we're proud to announce our new partnership with Townsend, which offers best-in-class key management and...

Learn More