<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Lisa Carroll

Lisa is Kelser's VP of Revenue who works at the intersection of business and technology to help Kelser’s clients jump on growth opportunities.

Blog Feature

News | Events | Foundation

By: Lisa Carroll
April 10th, 2019

We like doing extreme things with our bodies to support charities. We’ve run Tough Mudder and Rugged Maniac obstacle courses. We’ve climbed hundreds of stairs for the American Lung Association. And now we’ve taken a dip in a freezing lake in March for Special Olympics Connecticut. 

Blog Feature

IT Lifecycle Management | Managed Services

By: Lisa Carroll
January 9th, 2019

Software used to be such an adventure. Your company would buy a new program and then essentially be on your own to install it and learn how to use it. It might work out great, or it might be a frustrating fiasco. You bought it—it’s your problem now. Wisely, software companies have largely switched to a software-as-a-service model in which customers pay a recurring fee for use of software that is maintained and supported with customer service. Hardware is undergoing a similar transition with desktop-as-a-service, also known as device-as-a-service, or DaaS. Desktop-as-a-service shifts technology hardware from a capital expense to an operating cost. Rather than buying new computers and other technology in one large, up-front expense and then burdening your IT department with the massive task of setting them all up and maintaining them, a technology partner or managed service provider (MSP) will manage the assets for the entire lifespan.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Managed Services | In the Media | News

By: Lisa Carroll
September 27th, 2018

A well-known Connecticut business recently hired Kelser to hack them with a simulated phishing attack. Here’s how we did it. Over the past year, we’ve been working with Hoffman Auto Group, one of Connecticut’s largest auto dealers, to strengthen their cybersecurity posture and make sure their customer data is as safe as possible. After putting all the latest technology in place, it came time to address employee awareness since most cyber-attacks involve human error.

Blog Feature

Modern Data Center | Executive Consulting

By: Lisa Carroll
May 24th, 2018

When it comes to virtualizing your office, it’s important to consider whether you should replace older methods with their digital alternatives. Ever since the development of cloud technology, one option we have had is to replace local backup methods with off-site, cloud storage. To help you weigh your options, we’ve compiled a list of the pros and cons to each method.

Blog Feature

Cybersecurity | In the Media | News

By: Lisa Carroll
October 5th, 2017

Equifax made some serious mishaps lately, both technically and incident response. What’s really disturbing:  while this is the largest, this is not an isolated incident. We won’t cover the details here, since there are plenty of sources where you can find information about the breach, its consequences, and what has happened after that. What we will cover is some thoughts around what we can all learn from the events leading up to, during, and after the breach. At Kelser, we don’t want any company to fall victim to the same incident and aftermath that Equifax did. We match our recommendations to our clients’ business objectives, establishing a comprehensive and multi-layered strategy to manage risk before, during and after a cybersecurity incident.

Blog Feature

Office 365

By: Lisa Carroll
June 1st, 2016

If your business relies on computer files and documents to do its job, you’ve likely worried about the risks of lost data at some point. Saving documents to your hard drive is not always enough to keep your business protected. For instance, if your business’s hard drive becomes damaged, all of your work, and the work of your employees, can be gone in the blink of an eye. Some businesses don’t think about data loss until they’ve experienced it firsthand. But, with all the challenges businesses face when data loss occurs, it’s beneficial to come up with a preventative strategy early on.

Blog Feature

Office 365 | Workforce Enablement

By: Lisa Carroll
May 11th, 2016

As the business world evolves, management has become more innovative. Top managers have begun employing creative strategies to attract and retain top talent, and improve productivity while keeping costs in check. These advancements have not been entirely voluntary, as businesses are often forced to respond to several day-to-day challenges to stay afloat. Here are some of these key challenges:

Blog Feature

Office 365 | Workforce Enablement

By: Lisa Carroll
April 20th, 2016

The days of driving to the office, sitting behind a desk, and working from the same desktop computer for eight hours are becoming a thing of the past. Today’s managers and employees can work from the office, or a client’s location by using mobile devices and laptops. Unfortunately, the growing need for mobility has created new challenges for many business owners, particularly IT managers. How can businesses provide access to files and documents regardless of their employees’ physical location, while still ensuring security and sticking to budget?

Back to Top