<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Lisa Carroll

Lisa is Kelser's VP of Revenue who works at the intersection of business and technology to help Kelser’s clients jump on growth opportunities.

Blog Feature

News

By: Lisa Carroll
April 23, 2019

When you think of the LGBTQ community, you of course think of IT. Well, OK maybe not, but there’s actually more of a connection than there might seem at first. We knew we wanted to get involved with CT Voice, a new magazine for the LGBTQ community in Connecticut, as soon as we learned about it.

Blog Feature

News | Events | Foundation

By: Lisa Carroll
April 10, 2019

We like doing extreme things with our bodies to support charities. We’ve run Tough Mudder and Rugged Maniac obstacle courses. We’ve climbed hundreds of stairs for the American Lung Association. And now we’ve taken a dip in a freezing lake in March for Special Olympics Connecticut.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

IT Lifecycle Management | Managed Services

By: Lisa Carroll
January 09, 2019

Software used to be such an adventure. Your company would buy a new program and then essentially be on your own to install it and learn how to use it. It might work out great, or it might be a frustrating fiasco. You bought it—it’s your problem now. Wisely, software companies have largely switched to a software-as-a-service model in which customers pay a recurring fee for use of software that is maintained and supported with customer service. Hardware is undergoing a similar transition with desktop-as-a-service, also known as device-as-a-service, or DaaS. Desktop-as-a-service shifts technology hardware from a capital expense to an operating cost. Rather than buying new computers and other technology in one large, up-front expense and then burdening your IT department with the massive task of setting them all up and maintaining them, a technology partner or managed service provider (MSP) will manage the assets for the entire lifespan.

Blog Feature

Cybersecurity | Managed Services | In the Media | News

By: Lisa Carroll
September 27, 2018

A well-known Connecticut business recently hired Kelser to hack them with a simulated phishing attack. Here’s how we did it. Over the past year, we’ve been working with Hoffman Auto Group, one of Connecticut’s largest auto dealers, to strengthen their cybersecurity posture and make sure their customer data is as safe as possible. After putting all the latest technology in place, it came time to address employee awareness since most cyber-attacks involve human error.

Blog Feature

Modern Data Center | Executive Consulting

By: Lisa Carroll
May 24, 2018

When it comes to virtualizing your office, it’s important to consider whether you should replace older methods with their digital alternatives. Ever since the development of cloud technology, one option we have had is to replace local backup methods with off-site, cloud storage. To help you weigh your options, we’ve compiled a list of the pros and cons to each method.

Blog Feature

Cybersecurity | In the Media | News

By: Lisa Carroll
October 05, 2017

Equifax made some serious mishaps lately, both technically and incident response. What’s really disturbing: while this is the largest, this is not an isolated incident. We won’t cover the details here, since there are plenty of sources where you can find information about the breach, its consequences, and what has happened after that. What we will cover is some thoughts around what we can all learn from the events leading up to, during, and after the breach. At Kelser, we don’t want any company to fall victim to the same incident and aftermath that Equifax did. We match our recommendations to our clients’ business objectives, establishing a comprehensive and multi-layered strategy to manage risk before, during and after a cybersecurity incident.

Blog Feature

Office 365

By: Lisa Carroll
June 01, 2016

If your business relies on computer files and documents to do its job, you’ve likely worried about the risks of lost data at some point. Saving documents to your hard drive is not always enough to keep your business protected. For instance, if your business’s hard drive becomes damaged, all of your work, and the work of your employees, can be gone in the blink of an eye. Some businesses don’t think about data loss until they’ve experienced it firsthand. But, with all the challenges businesses face when data loss occurs, it’s beneficial to come up with a preventative strategy early on.

Blog Feature

Office 365 | Workforce Enablement

By: Lisa Carroll
May 11, 2016

As the business world evolves, management has become more innovative. Top managers have begun employing creative strategies to attract and retain top talent, and improve productivity while keeping costs in check. These advancements have not been entirely voluntary, as businesses are often forced to respond to several day-to-day challenges to stay afloat. Here are some of these key challenges:

Back to Top