<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity

By: George W Kudelchuk III
June 6th, 2019

Cybersecurity is the responsibility of everyone in your organization, not just the IT department. Executive positions such as the CIO (chief information officer), CISO (chief information security officer), and CTO (chief technology officer) are becoming more and more common, as leaders recognize the impact of cybersecurity on the business as a whole.

Blog Feature

Cybersecurity | In the Media | News

By: Jonathan Stone
June 4th, 2019

Only twice has Microsoft issued a patch for old, out-of-support versions of Windows: in 2017, just before the massive WannaCry cyber attack, and just recently. With newly discovered vulnerabilities from Intel, and even one in Windows 10, a very high number of computers around the world are potentially exposed right now. While we haven’t seen exploits yet to take advantage of these vulnerabilities, they likely aren’t far off. Conditions have scarcely been better for a massive cyber attack on the scale of WannaCry. Last week, I had the chance to break this down for listeners of the Brad Davis Show.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity

By: Andrew Tyler
May 29th, 2019

Cybersecurity risks have been on the rise in recent years, and products and services have been constantly evolving to keep up with these threats: 83 percent of organizations say that they experienced phishing attacks in 2018, up from 76 percent in 2017. Social engineering attacks use psychology to trick people into revealing sensitive information such as passwords and credit card numbers by impersonating a trusted authority. Cryptocurrencies such as Bitcoin are a new (and lucrative) attack target.

Blog Feature

Business Continuity | Disaster Recovery

By: Brian Mulligan
May 23rd, 2019

Many business owners simply don’t think about the topic of business continuity and disaster recovery, assuming that they’ll be fine just because they haven’t yet faced a catastrophe. Others argue that their IT department’s budget is too small to spare any funds for a hypothetical future event.

Blog Feature

Modern Data Center | In the Media | News

By: Jonathan Stone
May 15th, 2019

Cloud computing has been around for a while now, but it remains a bit mysterious to many in the business world. I was thrilled to have the chance to help well-known tech journalist John Edwards break down some common misconceptions and assumptions in an article for CIO.com.

Blog Feature

News

By: Adam Stahl
May 14th, 2019

Kelser is proud to announce that Jim Parise has been promoted to president. In 21 years with the company, Parise was previously vice president of professional services and an enterprise solutions executive. He was instrumental in launching Kelser's suite of professional services such as Cybersecurity-as-a-Service and technology lifecycle management.

Blog Feature

Workforce Enablement | In the Media | News

By: Brian Mulligan
May 8th, 2019

Voice over IP, or VoIP, has come a long way. Where once the call quality of a landline couldn’t be beat and voice communication over the internet was unreliable, companies can now run their entire voice communication system seamlessly through their internet connection and computers. The headsets and phones even look and function the same. VoIP is a very hot topic in the business world as companies evaluate if traditional phone lines continue to make sense for them or if one of the many VoIP options in the marketplace could save money, improve efficiency, or add useful features. This is something the team at Kelser routinely helps our clients navigate and implement. In fact, we even help the media provide information to the business community about VoIP.

Blog Feature

Cybersecurity | Executive Consulting

By: Adam Stahl
May 2nd, 2019

It seems like large-scale data breaches that expose thousands upon millions of records are regrettably becoming commonplace today. Protecting your personal and business data should be a priority for anyone that has ever entered information into a web form. Without taking proper steps to secure your data like login credentials, you could make yourself vulnerable to anything from phishing attacks to full account takeover (or even worse). Even a single breach can cost a business upwards of $2.3 million per attack (not to mention the costs related to things like the damage to your reputation) and personal accounts risk losing personal finances, priceless memories (like photos and videos), and more. One of the most basic ways to improve cybersecurity is to make sure you're following best practices for your passwords.