<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Kelser

By actively listening to the client, Kelser has consistently met the needs of its client base for over 30 years. Through attentive observation of the changing industry, Kelser is able to react quickly to provide the best service and solutions available. Thanks to the dedication of our professional staff, this agility has advanced us as leaders in our industry.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
May 19, 2017

Cybersecurity has become a mainstream point of discussion over the last five years. With notable attacks on Target, NASA, the United States Defense Department, and the WannaCry / WannaCrypt outbreak, the public now has a heightened sense of awareness (and fear) of cyber crime. Perhaps no industry needs a wake up call more than the healthcare industry.

Blog Feature

Cybersecurity

By: Kelser
January 23, 2017

The way people work today is fundamentally different than it used to be. The workplace is dependent on technology, and most companies store their sensitive data in locations that are vulnerable to hackers. In addition, as more devices join the Internet of Things, possible points of attack multiply quickly. Cyber criminals have adapted to this new normal. They now have more opportunities to do what they do best, and they are taking advantage of every weakness. Even though cybersecurity tools and strategies are always improving, breaches are still occurring on a regular basis and the privacy of our information continues to be questioned.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity

By: Kelser
January 11, 2017

What’s the #1 reason to create (and enforce) a small business cybersecurity policy? Getting hacked poses a serious risk for your business, if it hasn't already happened. Hacking, viruses, phishing, malware, worms, Trojans—cyber attacks go by various names, but the common denominator is that everyone has the potential to be attacked. Seriously, everyone—from the well-publicized 2016 hacking of the Democratic National Committee to the daily cyber attacks of more than 25 million small businesses in the US, it happens to everyone. So what’s a small business owner to do—throw up his hands (and his customers’ financial info) and give up? Far from it.

Blog Feature

Modern Data Center

By: Kelser
April 13, 2016

Kelser Corp and Cisco have been working together to provide businesses with the latest technology, proving to be both leaders and innovators in the industry. Cisco’s Unified Computing System (UCS) helps businesses simplify their operations, reduce their costs, and increase their speed, while Kelser provides customized technology solutions that help clients get the most out of their technology investments. Here’s a deeper look at how Cisco UCS functions, and how our teamwork is helping clients’ businesses to succeed in this fast-changing, technological world:

Blog Feature

Modern Data Center

By: Kelser
March 16, 2016

(This post provides a continuation to Matt Kozloski’s post about Nexus 9000 Automation. In his post, Matt provides a primer on Nexus 9000 and shows some example code using PowerShell to access the REST API on the Nexus 9000.) We already know that the Nexus 9000 is an awesome switch, before we even get to the goodness of its programmability features. For example, the Cisco Nexus 9372PX performs non-blocking 10G line rate switching, has 6x 40GbE uplinks, and it sports a rich set enterprise functions you would expect from a Cisco Nexus switch, such as L2 switching, L3 routing, VXLAN, VPC, and Fabric Extenders to name a few. In this exercise we are going to query the switch for some information remotely using Python.

Blog Feature

Cybersecurity | Modern Data Center

By: Kelser
March 09, 2016

Cisco has long been known as the digital Fort Knox of the network security world. Their breadth of products offers an all-encompassing path to internet security, and includes a multitude of security fronts.

Blog Feature

Modern Data Center | Business Continuity | Disaster Recovery | Managed Services

By: Kelser
February 17, 2016

The popularity of the Cloud is unquestionable, with the majority of U.S. businesses using cloud computing. But, with this increased usage, cloud-based Disaster Recovery (DR) has become even more crucial.

Blog Feature

Cybersecurity

By: Kelser
February 01, 2016

Over the weekend, a colleague sent me a link to the recent NASA data breach (the one where they hijacked a drone). The drone hijack is really the highlight of the article, but two things really resonated with me as well:

Back to Top