Earlier this year, a simple thought occurred to me. Hackers are the new mafia. Cybercrime is the newest part of the organized crime business model. How could looking at things this way change the cybersecurity landscape?
In late July, three Connecticut school districts experienced or became aware of data breaches or cyberattacks. The school districts of New Haven, Wallingford, and Pomfret were affected. NBC Connecticut interviewed Kelser’s George W. Kudelchuk III for a story that covers each of the three school districts.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
The 23rd Annual Kelser Charity Challenge will take place at Indian Hill Country Club in Newington, Connecticut, on September 17, 2019, to benefit the Hospital for Special Care's Center for Cognitive Health. The golf tournament--which is currently open for registration and sponsorship--is organized by Glastonbury-based technology consulting firm Kelser Corporation and will also feature a silent auction, dinner reception and "heli drop" in which a helicopter drops golf balls onto the course.
Glastonbury, CT, August 9, 2019 - Kelser Corp announced that CRN®, a brand of The Channel Company®, has named Kelser to its 2019 Fast Growth 150 list. The list recognizes the fastest-growing technology integrators, solution providers, and IT consultants in North America.
Less than 12 hours after the massive Capital One data breach was announced on a Monday night, Kelser CTO Jonathan Stone was on the phone with a reporter from The Washington Post helping break down the role of cloud storage in the story. In the days that followed, Kelser experts were on all four local Connecticut TV networks to provide perspective on this breach.
Improving record keeping and data handling is critical to keeping the trust of partners, vendors, contractors, and customers. The importance is magnified when the federal government is involved, with the goal of creating a national culture of cybersecurity that protects the information of our businesses, citizens, and government. The National Institute of Standards and Technology (NIST) created Special Publication 800-171 to help protect Controlled Unclassified Information. But what does that actually look like? How will you know you’re meeting the standards laid out in NIST 800-171? What is CUI?
Throughout our decades in the IT business, we’ve heard every reason in the book for why you don’t actually need a local IT managed services provider (MSP):
As part of my role as CTO at Kelser, I am also vCIO for some of our clients, such as Hoffman Auto Group. A vCIO, also called a virtual or fractional CIO, performs the strategic function of a tech executive for an organization that doesn’t necessarily need a fulltime CIO in house.