<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Andrew Tyler

Andrew, Senior Consulting Engineer at Kelser, believes in persistence, technical excellence and creativity in developing solutions – and adapting them – until our professional services clients are confident in what the technology will do for their business.

Blog Feature

Cybersecurity | Wireless | Networking | In the Media

By: Andrew Tyler
February 12th, 2020

The latest issue of Corporate & Incentive Travel Magazine tells the story of how I was at a conference—a cybersecurity conference of all things!—and it provided an unsecure general access wireless network. There was no preregistration for this network and the password was distributed freely to attendees. Most attendees wound up using the hotspots on their phones. Many conferences and events of all types have inadequate cybersecurity protections in place. The Wi-Fi networks offered at these events may seem more secure than public Wi-Fi, but in most cases, they are not. In fact, they could be more dangerous to use because hackers interested in a particular type of data can target the network of a specifically relevant conference (rather than the general network of a coffee shop, for instance).

Blog Feature


By: Andrew Tyler
September 2nd, 2019

Cybersecurity risks have been on the rise in recent years, and products and services have been constantly evolving to keep up with these threats: 83 percent of organizations say that they experienced phishing attacks in 2018, up from 76 percent in 2017. Social engineering attacks use psychology to trick people into revealing sensitive information such as passwords and credit card numbers by impersonating a trusted authority. Cryptocurrencies such as Bitcoin are a new (and lucrative) attack target.


Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | In the Media

By: Andrew Tyler
August 20th, 2019

Earlier this year, a simple thought occurred to me. Hackers are the new mafia. Cybercrime is the newest part of the organized crime business model. How could looking at things this way change the cybersecurity landscape?