<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Adam Stahl

Adam is a Biznologist who invites boundless creativity to achieve outcomes that inspire confidence.

Blog Feature

Cybersecurity

By: Adam Stahl
May 8th, 2019

If you're a supplier, contractor or subcontractor with the federal government, you or your colleagues have no doubt heard of NIST 800-171. If you haven't, check out "Everything You Need to Know About NIST 800-171." for all of the details, and how it may affect your business contracts.

Blog Feature

Cybersecurity | Executive Consulting

By: Adam Stahl
May 2nd, 2019

It seems like large-scale data breaches that expose thousands upon millions of records are regrettably becoming commonplace today. Protecting your personal and business data should be a priority for anyone that has ever entered information into a web form. Without taking proper steps to secure your data like login credentials, you could make yourself vulnerable to anything from phishing attacks to full account takeover (or even worse). Even a single breach can cost a business upwards of $2.3 million per attack (not to mention the costs related to things like the damage to your reputation) and personal accounts risk losing personal finances, priceless memories (like photos and videos), and more. One of the most basic ways to improve cybersecurity is to make sure you're following best practices for your passwords.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
May 1st, 2019

It’s well known that cyber attacks on businesses are increasing every year. The fact that the number of city governments falling victim to hackers as well is just coming to light. In Connecticut alone, the City of West Haven, the Derby Police Department, and the Bridgeport School District have all experienced cyber attacks in the past year inflicting varying degrees of damage.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
April 16th, 2019

Kelser was in news outlets across the world this spring when the Associated Press quoted CEO Barry Kelly in an article titled “6 things small businesses can do to improve cybersecurity” which ran in the New York Times, Washington Post, ABC News, Daily Mail, Fox Business, and many more.

Blog Feature

Managed Services

By: Adam Stahl
March 26th, 2019

Unless you're already in the IT field, small and medium businesses likely don't have all the knowledge or in-house staff required to manage their IT infrastructure themselves. That's where a managed services partner (MSP) comes in.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
March 12th, 2019

When the news emerged that there was a security issue in Google Chrome, Kelser provided NBC Connecticut with some expert perspective.

Blog Feature

Cybersecurity | Business Continuity | Disaster Recovery | Managed Services

By: Adam Stahl
March 5th, 2019

Managed services providers (MSPs) offer 24/7 support for your entire IT infrastructure: software, hardware, and configurations. These services are remotely monitored and managed in order to keep a pulse on your IT environment at all times.

Blog Feature

Cybersecurity | IT Lifecycle Management | Managed Services

By: Adam Stahl
January 17th, 2019

As technology relentlessly pushes forward, you and your organization will undoubtedly need to upgrade your hardware. However, you can’t simply forget about your old hardware while reaping the benefits of replacing it with the latest and greatest. You should be excited about the upgrade, but how will you transfer data from your old equipment to the new? How will you erase data from the original hardware?

Back to Top