Technology News & Blog

How We’re Helping Businesses Work Through COVID-19

April 9, 2020

Keeping people connected while keeping social distance might seem like a paradox, but for IT professionals, it’s what we do naturally. Now, though, this is the only way we can all successfully work together as the world navigates the COVID-19 pandemic in our countries, communities, and businesses.  While the dynamics of the working world have…

NoteFromDon

A Note From Our President

April 6, 2020

I wanted to take the opportunity to let you know how Concensus is taking care of our customers during COVID-19. We are fully remote but remain fully committed to addressing all of your existing and new business needs. We know your businesses are changing and facing challenges. Right now, our engineers are putting in additional…

What is Data Governance, and Why Do I Need it?

April 3, 2020

Data is critical to every aspect of how an organization functions, and it is constantly growing, which is why it’s so important to have the right processes and practices in place to manage company data.  More than 80 percent of an organization’s stored data is known as “unstructured data.” That means that spreadsheets, word processing…

Are Your Systems Prepared to Work Remotely?

March 17, 2020

Employees working remotely from home or on the road might be necessary for your organization at this time. Are your IT systems prepared? At Concensus, we have had remote employees from the first day we opened our doors in 2006. All of the software that we use to run our business is cloud-based.  In fact, we…

Use Gmail Email Alias for Cyber-Defense

March 10, 2020

If you use Gmail for personal email, we have a trick that can help you not only organize your inbox but also help protect you against a cyber-breach. Gmail has the ability for you to add in periods anywhere in the first part of your email address. For example, jane.doe@gmail.com can be j.anedoe@gmail.com. You can…

What you need to know about the Dark Web

March 3, 2020

The world can be a scary place, and the internet is no different. In recent years, more and more people are becoming aware of what’s known as the dark web—an underground and unregulated corner of the internet that holds a host of malicious, illegal, or otherwise disturbing online activities. Understanding what the dark web is,…

CTech_MFA Part2

What You Need to Know About Implementing Multi-Factor Authentication

February 6, 2020

Multi-Factor Authentication is one of the most secure cyber solutions available to organizations, applications, and users today. Some applications require MFA in order to access features and services, and many more offer it as an additional security option that users can choose to enable.   There are a variety of ways to implement MFA through popular…

Multi-Factor Authentication

Multi-Factor Authentication: What It Is & Why You Need It

February 4, 2020

It’s hard to create a unique password, let alone remember what password matches up with which account or website. Sometimes, it’s just easier to type in “123456” or “password”…two of the top five most commonly used and hacked passwords of 2019. With 63% of all breaches resulting from weak, default, or stolen passwords, even complex passwords aren’t…

Concensus_ZENworks2020

ZENworks 2020

January 29, 2020

ZENworks 2020 was released by Micro Focus in late 2019 and customers are upgrading in increasing numbers. The release plays well into the three core competencies of ZENworks: Managing the lifecycle of all endpoints Securing endpoint devices against common vulnerabilities Protecting company data that lives on endpoint devices All of this runs on an increasingly…

Let us give you peace of mind

Leave it to our experts to keep your organization secure around the clock. Partner with us for trusted technology support.