Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Karen brings unending curiosity to her role as Kelser's Content Manager. If you have a question, she wants to know the answer.
By:
Karen Cohen
June 17, 2022
Every business and IT leader understands the vital role that IT plays in the success of an organization. Whether you have internal staff or rely on an outside provider, key players ensure your IT infrastructure has the care and feeding it needs on a regular basis.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
By:
Karen Cohen
May 14, 2022
You’ve decided that your organization can benefit by partnering with an outside IT partner. You may have skill gaps that need to be addressed. You could need service desk support. Or maybe you are looking for someone to handle your network maintenance. Whatever the reason, you are ready and may have even started to evaluate IT providers.
By:
Karen Cohen
April 30, 2022
People who want to gain unauthorized access to information often use social engineering tactics that capitalize on human instincts. Tailgating and piggybacking are social engineering tactics that have nothing to do with riding the bumper of the car in front of you on the highway, playing cornhole at a football game, or carrying someone on your back.
By:
Karen Cohen
April 22, 2022
If you are considering working with an outside IT service provider, you’ve probably noticed that there are a variety of options. If you’re already in the decision-making process, you may be wondering how something that seems to be similar can vary so widely in cost.
Cybersecurity | IT Support | Information Security
By:
Karen Cohen
April 20, 2022
Business leaders know that social engineering attacks are on the rise. These attacks, in which people with bad intentions manipulate users into taking actions that will provide access to information or networks, take many forms.
By:
Karen Cohen
April 13, 2022
As a business leader, you understand that your IT infrastructure is important. You have invested in technology that positions your business for success. You’ve put security measures in place to keep your data safe. But, you know that risks still exist. You want to minimize them.