<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Patty Luxton

Patty is Kelser's Senior Vice President of Engineering Services and an industry veteran with 25 years of experience in the field.

Blog Feature

Wireless

By: Patty Luxton
September 17, 2021

We all know when it is time for a new mobile phone. The battery doesn’t hold a charge. The screen is cracked. It takes forever to do anything. Or the service provider lets us know an upgrade is available. We look at the new offerings, evaluate the staying power and benefits, and decide whether to switch.

Blog Feature

Cybersecurity | IT Lifecycle Management | IT Support

By: Patty Luxton
September 15, 2021

When a firewall is working, it’s the last thing on your mind. But, did you know that most firewalls have a lifespan of three to five years?

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Workforce Enablement | In the Media

By: Patty Luxton
July 07, 2021

Where exactly society will land on the ratio of employees working in a centralized office to those working from home is yet to be determined. But regardless of what that dynamic looks like a few years now, it’s worlds away from what it was just a few years ago.

Blog Feature

Networking | In the Media

By: Patty Luxton
May 06, 2021

This article originally appeared in the New England Real Estate Journal. The arrival of 5G wireless enables much broader internet availability and greater speeds on the job site as well as the opportunity to employ IoT (internet of things) devices that previously would not have been practical.

Blog Feature

Cybersecurity | In the Media | News

By: Patty Luxton
April 27, 2021

Cybersecurity is largely about identifying vulnerabilities and risky practices, ideally before hackers have the chance to find and exploit them. I was quoted extensively, along with experts from Deloitte, Schellman & Co., Sikich and Markel, in a story for SC Magazine on how data and the supply chain drive hidden network threats.

Blog Feature

Cybersecurity

By: Patty Luxton
March 25, 2021

Phishing is an old game, but the rules are always changing. I was quoted extensively, along with experts from companies like PwC, EY and McKinsey & Company, in a story for SC Magazine on developments in phishing of which CISOs, leaders and companies of all sizes need to be aware.

Blog Feature

Cybersecurity

By: Patty Luxton
May 13, 2020

You might remember a time when some folks believed that having one thing alone meant that their business devices or networks were secure. “We have a firewall, we’re fine!” “All of our PCs have antivirus, so we’re good!” In modern times any single, standalone security product (antivirus, firewall, etc.) isn’t enough to protect your business, your users, and your data. However, these things do make for effective layers when securing your business with a defense in depth security strategy. Defense in depth is a security approach that we at Kelser subscribe to wholeheartedly for ourselves and our clients. A strategy that should be applied whether you’re protecting your office or your home environment when working remotely. In this article, we’ll walk through what defense in depth is, how it can protect your business, and the most essential layers that you should consider for any environment.

Blog Feature

Cybersecurity | Networking

By: Patty Luxton
June 26, 2019

Here at Kelser, we’ve been in the IT consulting business for nearly four decades. By now, we’ve heard every excuse in the book from companies who don’t want to take a proactive approach to network security services.

Back to Top