<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

News | Press Release

By: Kelser Press
August 3rd, 2020

Glastonbury, CT – Kelser Corporation is proud to announce that CRN®, a brand of The Channel Company®, has named Kelser to its 2020 Fast Growth 150 list. Each year, CRN® recognizes the fastest-growing technology integrators, solution providers, and IT consultants across North America for the substantial growth and performance they’ve achieved over the previous two years. The elite group of companies named to this year’s list have generated a combined total revenue of more than $37.8 billion between 2018 and 2019.

Blog Feature

News | Press Release

By: Kelser Press
July 30th, 2020

Event info Date: Wednesday, August 5, 2020 (rescheduled from Aug. 4 due to weather) Time: 7:00 p.m. event start; approx. 7:30 p.m. Kelser/Fitbit donation, media interviews to follow Location: Outside of Glastonbury Community Center, 300 Welles St, Glastonbury COVID-19 protocol: Masks, 6ft physical distance   Press release Kelser Corporation and Fitbit Donate Fitness Trackers to Special Olympics Glastonbury Track & Field Team 20 Special Olympics track athletes ranging in age from 8-43 will receive devices at Aug 4 event GLASTONBURY, CONN.—With competition and practice on hold due to the COVID-19 pandemic, Special Olympics Glastonbury track and field athletes will get a new gadget to help maintain training. Kelser Corporation, an IT managed service provider in Glastonbury, held a steps competition among employees in the spring. The winner, Marketing Manager Lisa Carroll—who logged 1 million steps during the months of April and May got to make a donation to a charity of her choice and decided to support local Special Olympics Glastonbury athletes during the pandemic shutdown.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | In the Media

By: Jonathan Stone
June 26th, 2020

Last fall, I had the amazing experience of being interviewed by Chion Wolf—a familiar voice and personality to anyone who listens to WNPR—for the Connecticut Voice Podcast. The podcast highlights LGBT individuals from different areas of expertise across Connecticut and I was honored to be included. Our conversation touched on everything from coming out to helicopters, to cybersecurity—including my favorite interview question I’ve ever been asked comparing working in IT to being a pilot. Pride Month seemed like a good time to share some highlights from this interview, so below are two moments that stood out to me as well as the full audio recording.

Blog Feature

Modern Data Center | IT Lifecycle Management | Executive Consulting | Managed Services | In the Media | Cloud

By: Jonathan Stone
June 10th, 2020

As businesses continue to struggle with the economic fallout of COVID-19, many leaders are looking for ways to reduce costs, including technology. When implemented strategically, technology is a business enabler—an investment, not an expense. However, it’s always good to eliminate inefficiencies or redundancies in the IT department whenever possible. I recently had the chance to contribute to a TechRepublic article called “CIOs: 8 ways to trim IT budgets”. My tip, which focuses on telecom costs, is number 6. Below is more detail on how companies can potentially find savings in the IT budget.

Blog Feature

Cybersecurity

By: Andrew Tyler
May 29th, 2020

Cyberattacks are on the rise. It’s just a plain fact. Numerous studies, reports, and surveys have pointed to the findings that not only are cyberattacks on the rise but specifically ones designed around social engineering such as phishing attacks. Worse still – these attacks have seen an even bigger jump in frequency since remote work requirements have also increased. Cybercriminals see the amount of company devices outside the typical protections of their traditional offices being an opportunity to harvest data, lock up those devices, and make a quick buck (by the thousands). That’s why I wanted to talk to you about Umbrella (formally OpenDNS).

Blog Feature

Office 365 | Workforce Enablement

By: Tim Colby
May 21st, 2020

Remote collaboration is more important now than it has ever been. Businesses are searching out and identifying the best ways to empower their employees to stay connected from wherever they’re working. Microsoft Teams aims to meet that need by offering a single productivity and collaboration platform that allows you to video message or make/schedule video conference calls, instant message, file share, and collaborate on file editing in real time. You can check out my previous article on Microsoft Teams for more information about its capabilities and ways it could potentially benefit your organization. As an IT managed service provider (MSP) in Connecticut, we’ve seen an increased interest in Teams both internally and with our clients which is why I wanted to show you around the Microsoft Teams interface. Whether you’re just starting to use Teams or want to see what the interface is like before you consider it, this video and article below will show you what you or your end users would see as well as a quick run through of the tabs and features in the product.

Blog Feature

Cybersecurity

By: Patty Luxton
May 13th, 2020

You might remember a time when some folks believed that having one thing alone meant that their business devices or networks were secure. “We have a firewall, we’re fine!” “All of our PCs have antivirus, so we’re good!” In modern times any single, standalone security product (antivirus, firewall, etc.) isn’t enough to protect your business, your users, and your data. However, these things do make for effective layers when securing your business with a defense in depth security strategy. Defense in depth is a security approach that we at Kelser subscribe to wholeheartedly for ourselves and our clients. A strategy that should be applied whether you’re protecting your office or your home environment when working remotely. In this article, we’ll walk through what defense in depth is, how it can protect your business, and the most essential layers that you should consider for any environment.

Blog Feature

Business Continuity | Disaster Recovery

By: Andrew Tyler
April 30th, 2020

The novel coronavirus pandemic has taught us several lessons already and there’s likely more to learn. We’ve learned the definition of essential businesses and personnel during a time of crisis, the term “social distancing”, which employees are able to perform their duties remotely, and more. We’ve also learned that pandemics need to be included in every organization’s business continuity/disaster recovery (BCDR) plan. If you already account for them in your business plan, kudos to you! I recently wrote about how to go about this for the Hartford Business Journal and have included more detail below. When putting together a BCDR plan, I think many of us focus on the more typical potential disasters that come to mind like weather, human, and data related incidents. When gathering my thoughts for this, I even subconsciously put pandemic last when listing out types of plans to consider making. Did you have a plan in place that’s helped get your business through this crisis?

Back to Top