<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Adam Stahl

Adam is Kelser's Digital Strategist who invites boundless creativity to achieve outcomes that inspire confidence.

Blog Feature

Managed Services

By: Adam Stahl
April 20th, 2021

Technology is central to your business. You may not associate your business with having an “IT” department or “IT” needs but your technology would disagree. The desktops, laptops, mobile devices, machines on the line, network modem, router, switch, and more all need to be kept running so your business can keep running. I'd bet this scenario isn't unfamiliar: you or one of your employees is typing away at a spreadsheet or invoice when suddenly the screen freezes up. No input received from the mouse or keyboard. You perform or hear that familiar sound of someone doing the mouse slam equivalent of hitting the side of an old TV set. Finally, the screen goes blank and the system goes offline for the foreseeable future.

Blog Feature

Managed Services

By: Adam Stahl
April 13th, 2021

You’ve probably seen or heard the term “managed service provider” or “MSP” in conversations or articles. “Isn’t that just a techie way of saying IT firm or IT consultant?”, you may have asked yourself. I hate to say it, but the short answer is “kind of”. Some companies will use the terms, “managed service provider”, “MSP”, “IT firm”, and “IT consultant” interchangeably. I get that it can be confusing especially because each of those terms has a different set of expectations that comes along with them.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Business Continuity | In the Media | News

By: Adam Stahl
March 3rd, 2021

Thrive Global recently conducted a Q&A with Kelser President Jim Parise as part of the outlet's series on “5 Things You Need to Know to Optimize Your Company’s Approach to Data Privacy and Cybersecurity.” The article also ran in Authority Magazine.

Blog Feature

Cybersecurity | Business Continuity

By: Adam Stahl
February 23rd, 2021

Senior consulting engineer Andrew Tyler was a panelist for a recent cybersecurity virtual forum presented by the Hartford Business Journal. The theme of the forum was how the pandemic has forced a change in the way many businesses approach cybersecurity in this new work-from-home world.

Blog Feature

Cybersecurity

By: Adam Stahl
October 29th, 2020

This isn’t news but cyber threats are a persistent issue for businesses and individuals alike in this day and age. If anything, the COVID-19 pandemic has worsened the threat landscape as cyber criminals are taking advantage of the related uncertainty and rapid transition to remote workforces and learning environments. In Connecticut, we saw that firsthand as a ransomware attack locked down the first day for Hartford Public Schools last month. The City of Hartford’s response was exemplary as they did many things right before, during, and after the attack, but it served as a stark reminder of the ever-present threat of cyber criminals. With October being Cybersecurity Awareness Month, I reached out to some cybersecurity and technology professionals for tips and insights to help you secure your businesses and home (as for many of us this year our home has become our office) in hopes of a more cybersecure tomorrow for everyone.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
February 27th, 2020

The world learned last week that the information of over 10 million hotel guests at MGM Resorts was obtained by hackers. The data breach is the result of a security incident that occurred last year, but the data was being shared in hacker circles recently and discovered and verified by ZDnet. Most of the data is limited to hotel stay info, addresses, and phone numbers dating back to 2017 and earlier. Since Kelser is a trusted, local managed service and cybersecurity provider, FOX61 News had Kelser CTO Jonathan Stone on following the breach to discuss what hackers can do with this type of apparently harmless information.

Blog Feature

Cybersecurity | Executive Consulting | In the Media | News

By: Adam Stahl
January 14th, 2020

Hopefully you’re reading this on a device that is running an operating system other than Windows 7. If not, I have some bad news for you. You’re on your own.

Blog Feature

Cybersecurity | Wireless | Networking | In the Media | News

By: Adam Stahl
December 17th, 2019

IoT devices pose uniquely terrifying security threats. Just ask a Waterbury, Connecticut, family who was awakened and harassed by hackers accessing their Ring security cameras. As part of their coverage of this incident, WFSB Channel 3 news asked Kelser to offer some insight into how hackers may have gotten access, and what can be done to secure IoT devices.

Back to Top