<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Adam Stahl

Adam is Kelser's Digital Strategist who invites boundless creativity to achieve outcomes that inspire confidence.

Blog Feature

Cybersecurity | Business Continuity | Disaster Recovery | Managed Services

By: Adam Stahl
March 05, 2019

Managed services providers (MSPs) offer 24/7 support for your entire IT infrastructure: software, hardware, and configurations. These services are remotely monitored and managed in order to keep a pulse on your IT environment at all times.

Blog Feature

Cybersecurity | IT Lifecycle Management | Managed Services

By: Adam Stahl
January 17, 2019

As technology relentlessly pushes forward, you and your organization will undoubtedly need to upgrade your hardware. However, you can’t simply forget about your old hardware while reaping the benefits of replacing it with the latest and greatest. You should be excited about the upgrade, but how will you transfer data from your old equipment to the new? How will you erase data from the original hardware?

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
December 20, 2018

By now, you’ve probably heard about the Starwood Hotel breach. In November, Marriott, the world’s largest hotel chain, confirmed that as many as 500 million people who made reservations at one of its Starwood properties could have had their personal information—including names, mailing addresses, phone numbers, dates of birth, passport and credit card info—stolen by Chinese hackers. Peter Aiken, associate professor of information systems at the Virginia Commonwealth University School of Business, calls the attack “the biggest threat to U.S. national security that we have ever faced” from a data breach.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
December 19, 2018

At the recent TEDxHartford event, Kelser Vice President of Professional Services Matt Kozloski spoke about cybersecurity. His goal -- and our goal as a Cybersecurity-as-a-Service provider -- is to change the way the we think about cybersecurity, so that it becomes part of our habits. Watch the video and enjoy some choice quotes below.

Blog Feature

Cybersecurity

By: Adam Stahl
November 15, 2018

Each organization has its own approach to cybersecurity—some of them better than others. While many small businesses take a proactive role by working with third-party managed security service providers, others are content to employ “security through obscurity,” hoping that there will always be a bigger, more appealing target. Unfortunately, every business is a potential target for cyber criminals.

Blog Feature

Cybersecurity

By: Adam Stahl
October 18, 2018

It can be scary out there in the digital world. It seems like not a week goes by where we don’t hear about phishing emails, unpatched vulnerabilities, or the latest strain of ransomware exposing the data of millions of people and businesses to the prying eyes of malicious actors. Every person and every business are potential targets with some of the largest companies in the world susceptible to the same vulnerabilities as the average Joe at their home computer (phishing being a prime example). But all is not lost as October is National Cybersecurity Awareness Month! What better time to review your cybersecurity practices, discover where you can make improvements, and seize the chance to make positive change? Consider it a fall “spring cleaning” for your digital life and business.

Blog Feature

Cybersecurity | IT Lifecycle Management | Managed Services

By: Adam Stahl
August 29, 2018

IT hardware, like cars, are depreciating assets. As soon as you drive them off the proverbial lot, they begin to lose value. The reason for this depreciation is twofold: the product will eventually wear down, and newer models will be released with greater specs. Keeping this in mind, how often should you refresh your IT assets? To understand the answer to this question, let’s look at the IT-asset lifecycle management.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
August 28, 2018

RealClearLife, an online "guide to a life well lived," recently published an article called "25 Tips from Cybersecurity Experts on Protecting Your Data." The tips pull from experts from a wide range of backgrounds, including President George W Bush's White House CIO Theresa Payton and Kelser Vice President of Professional Services Matt Kozloski. Matt's quote points to one of our favorite tools: Cisco Umbrella, formerly known as OpenDNS:

Back to Top