<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | In the Media

By: Jonathan Stone
June 26th, 2020

Last fall, I had the amazing experience of being interviewed by Chion Wolf—a familiar voice and personality to anyone who listens to WNPR—for the Connecticut Voice Podcast. The podcast highlights LGBT individuals from different areas of expertise across Connecticut and I was honored to be included. Our conversation touched on everything from coming out to helicopters, to cybersecurity—including my favorite interview question I’ve ever been asked comparing working in IT to being a pilot. Pride Month seemed like a good time to share some highlights from this interview, so below are two moments that stood out to me as well as the full audio recording.

Blog Feature

Modern Data Center | IT Lifecycle Management | Executive Consulting | Managed Services | In the Media | Cloud

By: Jonathan Stone
June 10th, 2020

As businesses continue to struggle with the economic fallout of COVID-19, many leaders are looking for ways to reduce costs, including technology. When implemented strategically, technology is a business enabler—an investment, not an expense. However, it’s always good to eliminate inefficiencies or redundancies in the IT department whenever possible. I recently had the chance to contribute to a TechRepublic article called “CIOs: 8 ways to trim IT budgets”. My tip, which focuses on telecom costs, is number 6. Below is more detail on how companies can potentially find savings in the IT budget.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity

By: Andrew Tyler
May 29th, 2020

Cyberattacks are on the rise. It’s just a plain fact. Numerous studies, reports, and surveys have pointed to the findings that not only are cyberattacks on the rise but specifically ones designed around social engineering such as phishing attacks. Worse still – these attacks have seen an even bigger jump in frequency since remote work requirements have also increased. Cybercriminals see the amount of company devices outside the typical protections of their traditional offices being an opportunity to harvest data, lock up those devices, and make a quick buck (by the thousands). That’s why I wanted to talk to you about Umbrella (formally OpenDNS).

Blog Feature

Office 365 | Workforce Enablement

By: Tim Colby
May 21st, 2020

Remote collaboration is more important now than it has ever been. Businesses are searching out and identifying the best ways to empower their employees to stay connected from wherever they’re working. Microsoft Teams aims to meet that need by offering a single productivity and collaboration platform that allows you to video message or make/schedule video conference calls, instant message, file share, and collaborate on file editing in real time. You can check out my previous article on Microsoft Teams for more information about its capabilities and ways it could potentially benefit your organization. As an IT managed service provider (MSP) in Connecticut, we’ve seen an increased interest in Teams both internally and with our clients which is why I wanted to show you around the Microsoft Teams interface. Whether you’re just starting to use Teams or want to see what the interface is like before you consider it, this video and article below will show you what you or your end users would see as well as a quick run through of the tabs and features in the product.

Blog Feature

Cybersecurity

By: Patty Luxton
May 13th, 2020

You might remember a time when some folks believed that having one thing alone meant that their business devices or networks were secure. “We have a firewall, we’re fine!” “All of our PCs have antivirus, so we’re good!” In modern times any single, standalone security product (antivirus, firewall, etc.) isn’t enough to protect your business, your users, and your data. However, these things do make for effective layers when securing your business with a defense in depth security strategy. Defense in depth is a security approach that we at Kelser subscribe to wholeheartedly for ourselves and our clients. A strategy that should be applied whether you’re protecting your office or your home environment when working remotely. In this article, we’ll walk through what defense in depth is, how it can protect your business, and the most essential layers that you should consider for any environment.

Blog Feature

Business Continuity | Disaster Recovery

By: Andrew Tyler
April 30th, 2020

The novel coronavirus pandemic has taught us several lessons already and there’s likely more to learn. We’ve learned the definition of essential businesses and personnel during a time of crisis, the term “social distancing”, which employees are able to perform their duties remotely, and more. We’ve also learned that pandemics need to be included in every organization’s business continuity/disaster recovery (BCDR) plan. If you already account for them in your business plan, kudos to you! I recently wrote about how to go about this for the Hartford Business Journal and have included more detail below. When putting together a BCDR plan, I think many of us focus on the more typical potential disasters that come to mind like weather, human, and data related incidents. When gathering my thoughts for this, I even subconsciously put pandemic last when listing out types of plans to consider making. Did you have a plan in place that’s helped get your business through this crisis?

Blog Feature

Modern Data Center | In the Media

By: Tim Colby
April 28th, 2020

With so many businesses operating fully remotely, the ability to collaborate in the cloud has become essential. Hybrid cloud solutions give companies the flexibility to use the cloud in a way that best suits them. TechTarget recently interviewed me about how Amazon Web Services (AWS) fits into the hybrid cloud landscape. Thus far, AWS has not made a play to be a leader in hybrid cloud. But could that be part of a bigger strategy for the cloud computing giant?

Blog Feature

Cybersecurity | Workforce Enablement | In the Media

By: Jonathan Stone
April 24th, 2020

Video chat meetings are now part of daily operations for so many businesses. When the coronavirus quarantine period started, video conferencing was a bit of a fun novelty. Colleagues who had never tried Zoom were now using it multiple times a day. Sadly, it didn’t take hackers long to realize they could exploit the popularity of video chat platforms to commit cybercrimes. Zoom in particular has experienced so many security issues that many organizations, including school districts in NYC, have banned it. While there are certainly more secure platforms, I use Zoom every day. Since the COVID-19 pandemic began, Kelser has advised our clients on how to use Zoom and set it up for them. Recently, I was a guest on FOX 61 Morning News to discuss cybersecurity best practices for Zoom.

Back to Top