<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Karen Cohen

Karen brings unending curiosity to her role as Kelser's Content Manager. If you have a question, she wants to know the answer.

Blog Feature

Information Security

By: Karen Cohen
June 25, 2022

As a business leader, you understand the important role a firewall plays in protecting business and customer information. That’s why you have a firewall, right? 

Blog Feature

Managed Services | IT Support

By: Karen Cohen
June 18, 2022

Your organization’s IT infrastructure is vital to achieving business goals. Whether you have an internal IT staff or rely on outside resources, the care your IT receives can be the difference between success and failure. 

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

IT Support

By: Karen Cohen
June 17, 2022

Every business and IT leader understands the vital role that IT plays in the success of an organization. Whether you have internal staff or rely on an outside provider, key players ensure your IT infrastructure has the care and feeding it needs on a regular basis. 

Blog Feature

Cloud

By: Karen Cohen
May 21, 2022

Considering migrating your data to the cloud? You are not alone. 

Blog Feature

IT Support

By: Karen Cohen
May 14, 2022

You’ve decided that your organization can benefit by partnering with an outside IT partner. You may have skill gaps that need to be addressed. You could need service desk support. Or maybe you are looking for someone to handle your network maintenance. Whatever the reason, you are ready and may have even started to evaluate IT providers.

Blog Feature

Cybersecurity

By: Karen Cohen
April 30, 2022

People who want to gain unauthorized access to information often use social engineering tactics that capitalize on human instincts. Tailgating and piggybacking are social engineering tactics that have nothing to do with riding the bumper of the car in front of you on the highway, playing cornhole at a football game, or carrying someone on your back. 

Blog Feature

Cybersecurity

By: Karen Cohen
April 28, 2022

We’ve all heard about people who have fallen victim to a social engineering ploy that puts their organization’s sensitive information at risk.

Back to Top