This article originally appeared in the New England Real Estate Journal. The arrival of 5G wireless enables much broader internet availability and greater speeds on the job site as well as the opportunity to employ IoT (internet of things) devices that previously would not have been practical.
Cybersecurity is largely about identifying vulnerabilities and risky practices, ideally before hackers have the chance to find and exploit them. I was quoted extensively, along with experts from Deloitte, Schellman & Co., Sikich and Markel, in a story for SC Magazine on how data and the supply chain drive hidden network threats.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Phishing is an old game, but the rules are always changing. I was quoted extensively, along with experts from companies like PwC, EY and McKinsey & Company, in a story for SC Magazine on developments in phishing of which CISOs, leaders and companies of all sizes need to be aware.
You might remember a time when some folks believed that having one thing alone meant that their business devices or networks were secure. “We have a firewall, we’re fine!” “All of our PCs have antivirus, so we’re good!” In modern times any single, standalone security product (antivirus, firewall, etc.) isn’t enough to protect your business, your users, and your data. However, these things do make for effective layers when securing your business with a defense in depth security strategy. Defense in depth is a security approach that we at Kelser subscribe to wholeheartedly for ourselves and our clients. A strategy that should be applied whether you’re protecting your office or your home environment when working remotely. In this article, we’ll walk through what defense in depth is, how it can protect your business, and the most essential layers that you should consider for any environment.
As a managed services provider in Connecticut, we often get asked about the pros and cons of having internal or outsourced IT services. There are benefits to both, but the right decision usually comes down to the specific needs of the individual organization.
Every IT department can agree that achieving maximum efficiency is an important goal for them to work towards. Unfortunately, far too many companies aren’t able to reach this goal. According to a survey by Deloitte, only 22 percent of chief information officers agree that they have a high-performing IT culture.
Here at Kelser, we’ve been in the IT consulting business for nearly four decades. By now, we’ve heard every excuse in the book from companies who don’t want to take a proactive approach to network security services.
Many managed service providers (MSPs) will tell you that they offer network security services—but how do you know that their offerings are actually high-quality and useful to you as an organization?