News & Blog

concept of file sharing

Can you even imagine getting the job done without file sharing? Particularly when it comes to collaboration? File sharing has become a part of every-day business life. Employees need to have access and be able to share files, anywhere, anytime.  The problem is employees can access any consumer-based tool they want to get their job done faster, communicate more quickly, receive, and distribute their part of collaboration and more. ...

Learn More
secureworkfromhome

The work-world is going hybrid. When self-distancing, many employees moved to working from home with the intent of returning. However, recent surveys by Global Workplace Analytics indicate that a fourth to a third of remote employees will choose to remain working from home after the pandemic. Meanwhile, many businesses are reporting significant savings from not housing employees.  This means that IT needs to remain focused on both in-house and remote-access systems and security measures. The following list can help make sure...

Learn More
IT person standing in front of cloud services

Linux, Windows, and Mac exploits are often months in the making. Because system management is handled differently and independently from one another, hackers count on the fact that the security of these operating systems is siloed. Then the incremental changes that are part of a more significant or more sophisticated attack go unnoticed or ignored.  You have to know what...

Learn More
Risk Management and Assessment for Business

Most enterprise organizations have made foundational investments in Active Directory, leveraging Group Policy Objects (GPOs) to manage their environment securely. However, when making a move to cloud-based systems such as Microsoft Azure, many discover significant capability gaps. They want to utilize their already proven GPOs for both efficiency and consistency.  When organizations don't have consistent policies for both on-premises and...

Learn More
security-plan-image

Most businesses or organizations will experience a cybersecurity incident, perhaps in the form of a phishing attack, spam emails, or an internal employee accidentally releasing malware throughout the network. Regardless of the size or scope of the incident itself, your organization needs a plan of attack to get back to business as usual and ensure the episode doesn't have trickle-down...

Learn More
umbrella sign-over-network

When it comes to cybersecurity threats, every company is a potential target. There is growing uncertainty and concerns about the cybersecurity industry's ability to protect its customers, from schools and universities to small businesses and mom-and-pop storefronts, as well as Fortune 500 companies. Before the global pandemic, cybersecurity insurers saw many claims. However, with abrupt changes in how and where...

Learn More
hacker on computer

Cyber hygiene is a more elegant way to describe staying safe online. Unfortunately, no amount of software or hardware can protect your system from attempts of ransomware attacks, data breaches, and other threats 100% of the time. Fortunately, there are a few steps your school, business, or organization can take to stay safe online. How to Practice Safe Cyber Hygiene...

Learn More
Concensus_OneDriveFeatuers_BlogImage

Microsoft OneDrive’s newest features provide better collaboration, and productivity for all workers, whether they are working remotely, transitioning back to the office, or a mix of the two.  Here’s what you need to know about the latest round of OneDrive updates.  Collaboration is key.  OneDrive is making significant changes to increase usability and adoption to enable teams to work better...

Learn More

“We wanted to build a relationship rather than just purchase services.” Concensus had the recent opportunity to chat with Anthony Schroeder, Director of Infrastructure Systems and Services at Hamline University. Located in the Twin Cities, Hamline University is Minnesota’s first university, home to 2,900 students and 500 faculty and staff members. Anthony talked to us about the partnership we’ve formed...

Learn More

What is log management?  Most IT systems can generate log files, which contain information about an application's performance and provide critical data to developers on what is not working correctly.  Logs also provide vital insights (Think: "who, what, where, and when) for investigating an organizational security breach or a targeted cyber attack. When logs are analyzed in real-time or near...

Learn More