When a firewall is working, it’s the last thing on your mind. But, did you know that most firewalls have a lifespan of three to five years?
Where exactly society will land on the ratio of employees working in a centralized office to those working from home is yet to be determined. But regardless of what that dynamic looks like a few years now, it’s worlds away from what it was just a few years ago.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
You may have heard by now that the newest wireless standard 802.11ax, also known as Wi-Fi 6, is upon us. Many vendors are now incorporating this standard into their latest round of access points (AP) and hardware. You’re likely intrigued by that alone but also swarmed with a few questions. Like what the benefits of Wi-Fi 6 are outside of the info in manufacturer slicks. Over the past several years, I've worked in complex Wi-Fi environments where it has been critical to understanding how the various 802.11 protocols work and what has been most prominent in their feature evolution.
This article originally appeared in the New England Real Estate Journal. The arrival of 5G wireless enables much broader internet availability and greater speeds on the job site as well as the opportunity to employ IoT (internet of things) devices that previously would not have been practical.
Cybersecurity is largely about identifying vulnerabilities and risky practices, ideally before hackers have the chance to find and exploit them. I was quoted extensively, along with experts from Deloitte, Schellman & Co., Sikich and Markel, in a story for SC Magazine on how data and the supply chain drive hidden network threats.
Phishing is an old game, but the rules are always changing. I was quoted extensively, along with experts from companies like PwC, EY and McKinsey & Company, in a story for SC Magazine on developments in phishing of which CISOs, leaders and companies of all sizes need to be aware.
You might remember a time when some folks believed that having one thing alone meant that their business devices or networks were secure. “We have a firewall, we’re fine!” “All of our PCs have antivirus, so we’re good!” In modern times any single, standalone security product (antivirus, firewall, etc.) isn’t enough to protect your business, your users, and your data. However, these things do make for effective layers when securing your business with a defense in depth security strategy. Defense in depth is a security approach that we at Kelser subscribe to wholeheartedly for ourselves and our clients. A strategy that should be applied whether you’re protecting your office or your home environment when working remotely. In this article, we’ll walk through what defense in depth is, how it can protect your business, and the most essential layers that you should consider for any environment.
As a managed services provider in Connecticut, we often get asked about the pros and cons of having internal or outsourced IT services. There are benefits to both, but the right decision usually comes down to the specific needs of the individual organization.